redteam-project / compliant
Ansible role for security standards compliance
☆13Updated 6 years ago
Alternatives and similar repositories for compliant:
Users that are interested in compliant are comparing it to the libraries listed below
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 6 months ago
- This project is no longer maintained. There's a successor at https://github.com/zeek-packages/zeek-agent-v2☆14Updated 4 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- ☆14Updated 6 years ago
- Containerized pentesting tools☆45Updated 2 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 3 months ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Set of PoC for exploits for QRadar SIEM☆15Updated 7 years ago
- Windows Security Logging☆43Updated 2 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- A packer utility to create and capture DFIR Image for use AWS & Azure☆15Updated 5 years ago
- ☆15Updated 3 years ago
- BloodHound Data Scanner☆45Updated 4 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 5 years ago
- Exfiltration based on custom X509 certificates☆26Updated last year
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Code and Slides of my BSides London 2019 presentation about Attacker Emulation using CALDERA☆22Updated 5 years ago
- Threat Mapping Catalogue☆17Updated 3 years ago
- ☆28Updated 4 months ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- This repository contains all the config files and scripts used for our Open Source Endpoint monitoring project.☆34Updated 5 years ago