sensepost / policiesLinks
Collection of information security policies.
☆29Updated 8 years ago
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- Web based analysis platform for use with the AWS_IR command line tool.☆17Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- firewall port testing tool☆12Updated 6 years ago
- ☆25Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Next Generation of White Chapel☆21Updated 10 years ago
- The initial conversation slides and menu of scenarios☆38Updated 3 years ago
- Ruby Oracle Security Scanner☆16Updated 12 years ago
- Pull author and committer names and emails from Travis-CI☆11Updated 4 years ago
- Some simple and useful tools☆15Updated 7 years ago
- Traceroute improved wrapper for CSIRT and CERT operators☆38Updated 7 months ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Cli interface to threatcrowd.org☆19Updated 7 years ago
- Detect malicious domain, Blablablablabla☆26Updated 8 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Checks observables/ioc in TheHive/Cortex against the MISP warningslists☆14Updated 7 years ago
- This repository is a curated list of pro bono incident response entities.☆20Updated last year
- Next major release of sniffMyPackets - Now with added packet loving☆12Updated 10 years ago
- Lutech TMS EHAT-NG☆14Updated 7 years ago
- DEPRECATED! LOOK AT CREDNINJA! A tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a …☆15Updated 8 years ago
- B-Sides CBR 2018 talk about group policy and Grouper☆39Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Office 365 MFA capture toolkit☆12Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- SQL Injection without the pain of syringes.☆25Updated 8 years ago
- How can you track the hunting techniques you come up with?☆13Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- splunk alert script to create resilient tickets☆10Updated 8 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago