redteam-project / compliantLinks
Ansible role for security standards compliance
☆13Updated 6 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below
Sorting:
- Containerized pentesting tools☆46Updated 3 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated 2 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 3 years ago
- ☆12Updated 8 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- Training scenarios for cyber ranges☆14Updated 5 years ago
- A CVE Heatmap Using CalPlot☆97Updated 5 years ago
- A Passive SSH back-end and scanner.☆104Updated 7 months ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- A tool to run nmap against each line in a script.☆17Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 6 years ago
- HoneySAP: SAP Low-interaction research honeypot☆51Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Updated last year
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 5 years ago
- ☆15Updated 4 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- ☆14Updated 7 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆30Updated 7 years ago
- SIEM-From-Scratch is a drop-in ELK based SIEM component for your Vagrant infosec lab☆37Updated 5 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆125Updated 2 weeks ago
- collector/runner☆64Updated 5 months ago
- Threat Mapping Catalogue☆18Updated 4 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Updated 5 years ago
- Example Suricata rules implementing some of my detection tactics☆22Updated 3 years ago