vtnsiSDD / use-and-abuse-pii
☆15Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for use-and-abuse-pii
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆31Updated last year
- ☆21Updated 3 months ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- OSINT tool to search, parse and dump only the open Elasticsearch and MongoDB directories that have the data you care about exposing☆46Updated 2 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆52Updated this week
- ☆22Updated 2 years ago
- A free, open-source, multi-lingual, template-based VDP policy, safe harbor clause, securitytxt, and DNS Security TXT generator.☆15Updated last year
- A cyber security-focused playing card game☆13Updated 3 years ago
- Ideaslocas Repository☆37Updated 3 years ago
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆24Updated last year
- Create machine images containing the Nessus vulnerability scanner☆11Updated 2 weeks ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 2 years ago
- REST API backend for Reconmap☆47Updated this week
- Virtual Security Operations Center☆49Updated last year
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆49Updated 11 months ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆28Updated 3 weeks ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆27Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆12Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- retrive metadata endpoint data with these one liners.☆37Updated 4 years ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated last year
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 6 months ago
- Stats about HTTP response security headers usage mentioned by the OSHP.☆13Updated last week