usnistgov / mobile-threat-catalogue
NIST/NCCoE Mobile Threat Catalogue
☆141Updated last year
Related projects: ⓘ
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆108Updated 8 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆97Updated 8 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 4 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆275Updated 6 years ago
- WALKOFF-enabled applications. #nsacyber☆141Updated 5 years ago
- OpenDXL Python Client☆92Updated last month
- Assesses CPU security of embedded devices. #nsacyber☆137Updated 8 years ago
- An easy-to-deploy virtual machine that can provide flexible man-in-the-middle capabilities.☆195Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆185Updated 2 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 7 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆130Updated 7 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆97Updated 7 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 7 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆72Updated 7 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆72Updated 8 years ago
- The foghorn project is a DNS proxy intended to reduce user exposure to phishing and other malicious items that can be interdicted by DNS …☆140Updated 7 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 6 years ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆286Updated last year
- Documentation for the GRR Rapid Reponse framework☆298Updated last month
- A Github organization reconnaissance tool.☆214Updated last year
- Threat Analysis, Reconnaissance, and Data Intelligence System☆121Updated 9 years ago
- Configuration guidance for implementing Pass-the-Hash mitigations. #nsacyber☆194Updated 7 years ago
- Sandia Cyber Omni Tracker (SCOT)☆244Updated last year
- This repo contains all of my OS hardening scripts☆68Updated 6 years ago
- ☆82Updated last year
- Threatbutt python client and Maltego transforms☆48Updated 3 months ago
- A tool to retrieve malware directly from the source for security researchers.☆562Updated 7 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆137Updated 5 years ago
- Harden the world is a community driven project to develop hardening guidelines and checklists for common software and devices.☆187Updated 3 years ago