usnistgov / mobile-threat-catalogue
NIST/NCCoE Mobile Threat Catalogue
☆148Updated last year
Alternatives and similar repositories for mobile-threat-catalogue
Users that are interested in mobile-threat-catalogue are comparing it to the libraries listed below
Sorting:
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 8 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆190Updated 3 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆131Updated 7 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 5 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 6 years ago
- OpenDXL Python Client☆94Updated 3 months ago
- Script for generating Bro intel files from pdf or html reports☆77Updated 9 years ago
- WALKOFF-enabled applications. #nsacyber☆144Updated 6 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 8 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 8 years ago
- Miscelaneous useful scripts for my day to day projects☆124Updated 4 years ago
- Sandia Cyber Omni Tracker (SCOT)☆246Updated 6 months ago
- ☆83Updated 2 years ago
- This repo contains all of my OS hardening scripts☆68Updated 7 years ago
- Threatbutt python client and Maltego transforms☆51Updated 11 months ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆97Updated 8 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Citizen Lab Malware Reports☆274Updated 4 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 8 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Filters that process and transform the output of osxcollector☆77Updated 5 years ago
- Docker container for MISP☆96Updated 6 years ago
- ☆73Updated 7 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆290Updated last year
- ☆198Updated 9 years ago
- a low-interaction honeypot☆93Updated 7 years ago