usnistgov / mobile-threat-catalogue
NIST/NCCoE Mobile Threat Catalogue
☆143Updated last year
Related projects ⓘ
Alternatives and complementary repositories for mobile-threat-catalogue
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆110Updated 8 years ago
- A prototype that demonstrates a method for scoring how well Windows systems have implemented some of the top 10 Information Assurance mit…☆98Updated 8 years ago
- Identifies defensive gaps in security posture by leveraging Mitre's ATT&CK framework. #nsacyber☆163Updated 4 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Collection of IOCs related to targeting of civil society☆188Updated 3 years ago
- iSEC Partners' research publications☆76Updated 8 years ago
- Common Findings Database☆100Updated 5 years ago
- SeaSponge is an accessible threat modelling tool from Mozilla☆278Updated 6 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Updated 9 years ago
- Certificate Store Monitor based off of a concept by Steve Gibson of GRC.☆28Updated 8 years ago
- ☆198Updated 8 years ago
- Sandia Cyber Omni Tracker (SCOT)☆245Updated 2 weeks ago
- A tool for scrapping the possible malware from the Wikileaks AKP leak☆101Updated 8 years ago
- Threatbutt python client and Maltego transforms☆49Updated 5 months ago
- Dashboard to collect, analyze, and respond to reported phishing emails.☆284Updated last year
- This repo contains all of my OS hardening scripts☆68Updated 6 years ago
- A toolkit to generate an offline Chrome extension to detect phishing attacks using a bespoke convolutional neural network.☆130Updated 7 years ago
- Assesses CPU security of embedded devices. #nsacyber☆138Updated 8 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated last year
- WALKOFF-enabled applications. #nsacyber☆142Updated 5 years ago
- ☆92Updated 6 years ago
- SIFT Bootstrap Script☆146Updated 7 years ago
- ☆73Updated 6 years ago
- Get your APT on using social media as a tool for data exfiltration.☆144Updated last year
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆74Updated 8 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆138Updated 5 years ago
- Various public documents, white-papers, articles, data, analysis, and statistics about breaches and security trends.☆88Updated 5 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 6 years ago
- pastebin.com Content Monitoring Tool☆193Updated 12 years ago