redteam-project / compliantLinks
Ansible role for security standards compliance
☆13Updated 6 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below
Sorting:
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- Pattern recognition for hosts, services, and content☆13Updated 3 years ago
- Containerized pentesting tools☆45Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 7 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆19Updated 2 years ago
- ☆11Updated 8 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last month
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Accompanying PowerShell Modules for DevSec Defense Presentation☆29Updated 7 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 10 months ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- ☆14Updated 7 years ago
- Threat intelligence and threat detection indicators (IOC, IOA)☆52Updated 4 years ago
- Quantitate binary risk assessment☆17Updated 3 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆13Updated last month
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Training scenarios for cyber ranges☆12Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆33Updated 3 years ago
- YETI (Your Everyday Threat Intelligence) Integration to Elastic Stack☆16Updated 4 years ago
- Fake SMB and SAMR data☆11Updated 5 years ago
- A Passive SSH back-end and scanner.☆104Updated 3 months ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆25Updated last year
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Updated 3 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated 2 months ago