texadactyl / diyca
Do-It-Yourself Certificate Authority
☆31Updated 2 weeks ago
Alternatives and similar repositories for diyca:
Users that are interested in diyca are comparing it to the libraries listed below
- This project provides tools to manage configurations for Cisco devices. Requires PHP5 and MySQL.☆17Updated 3 years ago
- Own Certificate Authority - ownca☆32Updated 5 months ago
- MikroTik RouterOS scripts☆21Updated 3 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆15Updated 2 months ago
- A bash script wrapper for OpenSSL that generates and manages a simple PKI suitable for small deployments☆46Updated 5 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 5 years ago
- A Python client for the Microsoft AD Certificate Services web page☆79Updated 9 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆15Updated 3 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- Cisco AMP threat hunting scripts☆14Updated 3 months ago
- Build Automated Machine Images for MISP☆28Updated last year
- PowerShell based STIG Scanner.☆11Updated 2 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 2 months ago
- VyOS inside a container.☆14Updated 5 years ago
- L2TP/IPsec on MikroTik RouterOS tutorial☆15Updated 7 years ago
- Snort is an open-source, free and lightweight network intrusion detection system (NIDS) software for Linux and Windows to detect emerging…☆23Updated 7 years ago
- NSE script to automatically discover SD-WAN nodes☆24Updated 5 years ago
- pfSense Automator - a command line tool to make pfSense configurations☆18Updated 4 years ago
- Pluggable ACME: a tiny ACME-CA implementation to enhance existing CA infrastructure☆49Updated 2 months ago
- Manufacturer Usage Description (MUD) is a technique whereby constrained end devices (e.g., IoT devices) can signal to the network what so…☆22Updated 3 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆14Updated 6 years ago
- Convert an IOS/NXOS/ACE/ASA config file into basic HTML, creating links between commands referencing lists and that list (e.g. access lis…☆14Updated 6 years ago
- This repo contains information on how to auto deploy Sysmon via GPO and Task Scheduler☆12Updated 3 years ago
- (DEPRECATED) Azure AD authentication for SSH servers.☆13Updated 5 years ago
- Let's Encrypt encourages the use of certbot to automate certificate renewal, but that tool generates a new CSR every time. That makes DAN…☆12Updated last year
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- Porting Suricata to Bro signatures☆6Updated 5 years ago
- Uses BeautifulSoup and RegEx to pull and parse data directly form Cisco IP Phones☆14Updated 3 years ago
- Collaborative, web-based case management for incident response☆20Updated last year
- A Python DNS crawler to find identical domain names under different TLDs.☆24Updated 5 years ago