NIST/NCCoE Mobile Threat Catalogue
☆150Aug 13, 2025Updated 6 months ago
Alternatives and similar repositories for mobile-threat-catalogue
Users that are interested in mobile-threat-catalogue are comparing it to the libraries listed below
Sorting:
- A tool for characterizing the network behavior of IoT Devices. The primary intended use is to assist in the generation of allowlist files…☆25Jul 23, 2025Updated 7 months ago
- Understand OVAL results in a blink of an eye☆35Jul 6, 2022Updated 3 years ago
- ☆19Oct 30, 2020Updated 5 years ago
- Cloud Trust Protocol Server☆11Jan 5, 2016Updated 10 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14May 2, 2025Updated 10 months ago
- ☆14Dec 2, 2021Updated 4 years ago
- Proof of concept to test POODLE over TLS☆11Mar 13, 2015Updated 10 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Mar 29, 2021Updated 4 years ago
- Kestrel Jupyter Notebook Kernel☆10Oct 19, 2023Updated 2 years ago
- mindmap created for tools can be used during analysis/investigation☆28Jan 4, 2017Updated 9 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆13Aug 7, 2016Updated 9 years ago
- Robotic platform for industrial control systems cybersecurity research. We use the research-grade Youbot as the robotics platform for ou…☆27Aug 6, 2015Updated 10 years ago
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- Open Security Controls Assessment Language (OSCAL)☆853Updated this week
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆32Aug 6, 2019Updated 6 years ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆256Mar 30, 2017Updated 8 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- This is the repository for NIST Blockchain developments☆15Nov 7, 2017Updated 8 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- OpenDXL Broker is an open source version of a Data Exchange Layer (DXL) broker☆14Feb 11, 2024Updated 2 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Sep 23, 2020Updated 5 years ago
- Using osquery for Mass Incident Detection & Response☆19Jun 25, 2016Updated 9 years ago
- Implementations of the GEA-1 and GEA-2 (GPRS Encryption Algorithm) stream ciphers in C, Python and Rust.☆17Feb 24, 2026Updated 2 weeks ago
- Template for building a packet sniffer☆15Mar 25, 2024Updated last year
- An implementation of the IETF QUIC protocol in F*☆20Aug 8, 2019Updated 6 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Jun 15, 2021Updated 4 years ago
- This is a working copy of the OWASP Project Handbook and is the draft where changes are made before publishing a final version on the OWA…☆18Feb 22, 2017Updated 9 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 9 months ago
- Stakeholder-Specific Vulnerability Categorization☆176Updated this week
- ATT&CK Powered Suit is a browser extension that puts the complete MITRE ATT&CK® knowledge base at your fingertips with text search, conte…☆82Jun 9, 2025Updated 9 months ago
- ☆17Nov 10, 2018Updated 7 years ago
- Robinhood Riemann configuration☆15Oct 10, 2017Updated 8 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year