usnistgov / mobile-threat-catalogueLinks
NIST/NCCoE Mobile Threat Catalogue
☆149Updated last month
Alternatives and similar repositories for mobile-threat-catalogue
Users that are interested in mobile-threat-catalogue are comparing it to the libraries listed below
Sorting:
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆114Updated 9 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆279Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Repository of my Computer and Information Security work.☆67Updated 7 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆131Updated 8 years ago
- ☆200Updated 9 years ago
- A userland network manager with monitoring and limiting capabilities for macOS. #nsacyber☆77Updated 8 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆99Updated 9 years ago
- Mapping the NYC Infosec Community☆55Updated this week
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 10 years ago
- A test framework for testing SSL/TLS client certificate validation.☆94Updated 4 years ago
- A framework for BREACH and other compression-based crypto attacks☆233Updated 5 years ago
- iSEC Partners' research publications☆76Updated 9 years ago
- A Security and Privacy Guide for non-technical users☆45Updated 9 years ago
- A report to synthesize findings from the Defcon 25 Voting Machine Hacking Village☆63Updated 7 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- An attack tree generator built on electron☆62Updated 9 years ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆102Updated 8 years ago
- The SIMON and SPECK families of lightweight block ciphers. #nsacyber☆165Updated 5 years ago
- Assesses CPU security of embedded devices. #nsacyber☆139Updated 9 years ago
- This repo contains all of my OS hardening scripts☆69Updated 7 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 9 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆144Updated 3 months ago
- Use computer vision to determine if an IDN can be interpreted as something it's not☆62Updated 8 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Vortex is a near real time IDS and network surveillance engine for TCP stream data.☆99Updated 8 years ago
- Threatbutt python client and Maltego transforms☆51Updated last year
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 10 years ago
- a grep -r for secrets☆178Updated 3 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆104Updated 7 years ago