sbaresearch / amlsec
Automated Security Risk Identification Using AutomationML-based Engineering Data
☆28Updated 2 years ago
Alternatives and similar repositories for amlsec:
Users that are interested in amlsec are comparing it to the libraries listed below
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- Swiftly search FDNS datasets from Rapid7 Open Data☆21Updated 2 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Tools for auditing WAFS☆18Updated 2 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆20Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated last month
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- ☆14Updated 5 years ago
- A proof of concept implementation of the Siemens S7 protocol analyser for the Bro IDS.☆16Updated 7 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆30Updated 6 years ago
- HoneyDB Python Module☆13Updated 11 months ago
- ☆25Updated 3 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Restructured and Collaborated SIEM and CVSS Infrastructure. Presented at Blackhat Asia Arsenal 2020.☆3Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Automation platform for open source intelligence☆13Updated last year
- Burp extension for automated handling of CSRF tokens☆16Updated 6 years ago
- ☆20Updated 4 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago