surevine / spiffingLinks
Jolly good library for SPIF/Label/Clearance handling
☆11Updated last year
Alternatives and similar repositories for spiffing
Users that are interested in spiffing are comparing it to the libraries listed below
Sorting:
- DNS Firewall Enforcer☆50Updated 6 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 5 years ago
- An open source software directory and release tracker.☆23Updated last week
- D4 core software (server and sample sensor client)☆42Updated last year
- A local scanner for vulnerable web applications☆40Updated 3 weeks ago
- Busted. With duct tape, spit and tears. Brought to you by beer.☆12Updated 3 years ago
- X.509 Swiss Army Knife is a toolkit atop OpenSSL to ease generation of CAs and aid white-hat pentesting☆43Updated 2 years ago
- Extract TLS certificates from pcap files or network interfaces, fingerprint TLS client/server interactions with ja3/ja3s☆37Updated 5 years ago
- ☆26Updated 4 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆88Updated last year
- A configurable rule-based labeling tool for network flow files.☆17Updated 2 years ago
- Tools to work with the pwnedkeys.com API☆10Updated 6 years ago
- Various modules to implement the DetecTor design from http://detector.kuix.de☆52Updated 9 years ago
- The tools used for the DNS spies blog post☆48Updated 7 years ago
- Enterprise Linux Exploit Mapper☆28Updated 7 years ago
- Architecture - design and implementation of the D4 project architecture☆16Updated 3 months ago
- Example code for FIDO U2F authentication with the Lua module in nginx☆31Updated 10 years ago
- egrets monitors egress☆46Updated 5 years ago
- FireEgl's PuTTY - FuTTY!☆18Updated 9 years ago
- CyCAT.org API back-end server including crawlers☆29Updated 2 years ago
- Tools for Network Archaeology (internet protocol analysis)☆29Updated last month
- Fedora Cyber Test Lab offers quantitative static and dynamic risk analysis of binaries☆12Updated 7 years ago
- Network visualizer tool built using Processing☆24Updated 4 years ago
- A Spicy protocol analyzer for WireGuard☆29Updated 5 years ago
- You're busted!☆27Updated 5 years ago
- Simple Event Correlator ruleset repository☆31Updated 3 years ago
- Private Search Set (PSS) is an extension to standard Bloom filter or a standalone hash file to describe and share private set.☆16Updated 9 months ago
- Python bindings for yescrypt: memory-hard, NIST-compliant password hashing☆15Updated last year
- server for indexing and querying passive DNS observations☆47Updated 3 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆56Updated last month