redteam-project / compliantLinks
Ansible role for security standards compliance
☆13Updated 6 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below
Sorting:
- Containerized pentesting tools☆45Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated last year
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Updated last year
- Training scenarios for cyber ranges☆12Updated 5 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated 3 weeks ago
- ☆14Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago
- Carving tool based in Radare2 & Yara☆16Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Threat Mapping Catalogue☆18Updated 4 years ago
- ☆11Updated 8 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 3 months ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆40Updated 9 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 3 years ago
- D4 core software (server and sample sensor client)☆42Updated last year
- Automatic detection engineering technical state compliance☆55Updated last year
- Cockroach is your primitive & immortal swiss army knife.☆49Updated 3 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Cybersecurity Incidents Mind Maps☆34Updated 4 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- CARET - A tool for viewing cyber analytic relationships☆55Updated 5 years ago
- A Passive SSH back-end and scanner.☆104Updated 4 months ago
- A curses-style interface for automatic takedown notification based on MISP events.☆20Updated 4 years ago