usnistgov / mobile-threat-catalogueLinks
NIST/NCCoE Mobile Threat Catalogue
☆149Updated 3 months ago
Alternatives and similar repositories for mobile-threat-catalogue
Users that are interested in mobile-threat-catalogue are comparing it to the libraries listed below
Sorting:
- ☆198Updated 9 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆279Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 9 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆132Updated 8 years ago
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆98Updated 8 years ago
- This repo contains all of my OS hardening scripts☆69Updated 8 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 9 years ago
- Common Vulnerabilities and Exposures - Portal. Archived and now replaced by vulnerability-lookup.org☆87Updated 9 months ago
- Uses Shodan to locate HackingTeam C&C Servers.☆79Updated 10 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Mapping the NYC Infosec Community☆56Updated 2 months ago
- Repository of my Computer and Information Security work.☆67Updated 7 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- The Digital First Aid Kit has moved to Gitlab:☆110Updated 6 years ago
- DEPRECATED USE v3!☆59Updated 10 years ago
- A framework for BREACH and other compression-based crypto attacks☆235Updated 5 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆164Updated 5 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆60Updated 5 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆92Updated 6 years ago
- a grep -r for secrets☆178Updated 3 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆79Updated 9 years ago
- SIFT Bootstrap Script☆145Updated 8 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆144Updated last week
- Collection of IOCs related to targeting of civil society☆190Updated 4 years ago