Framework for API Maturity Assessment
☆20Jan 17, 2020Updated 6 years ago
Alternatives and similar repositories for APIMaturity
Users that are interested in APIMaturity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Your best is still an idiot.☆10Sep 24, 2021Updated 4 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Converts Sigma detection rules to a Splunk alert configuration.☆12Jul 1, 2021Updated 4 years ago
- Amazon EC2 Container Service Agent☆11Jan 16, 2025Updated last year
- Automated deployment of MISP and MISP-Dashboard via K8S and AWS☆19Dec 9, 2019Updated 6 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- DNS server limitation mapper☆26Oct 22, 2018Updated 7 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Simple Terraform module for asserting value equality☆11Oct 6, 2017Updated 8 years ago
- Automate config downloads, script execution, config changes, etc.☆13Aug 18, 2022Updated 3 years ago
- Making it easy to implement Lambda-backed CloudFormation custom resources☆14Apr 1, 2018Updated 7 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Repository documenting how Threat Intelligence and / or a Threat Intelligence Platform can prove its value to an organisation.☆53Oct 23, 2024Updated last year
- Updated incident response generator for training classes☆43Jun 2, 2021Updated 4 years ago
- A list of Information Security firms operating in th Asia-Pacific region, and where student intake opportunities can be found.☆24Oct 30, 2020Updated 5 years ago
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- Extracts Azure authentication tokens from PowerShell process minidumps.☆25May 20, 2023Updated 2 years ago
- C# Implementation of Get-VaultCredential☆14Jul 31, 2018Updated 7 years ago
- first commit☆24Feb 16, 2026Updated last month
- Gain additional code space via cheeky compression for Python AWS Lambda functions defined in-line to CloudFormation templates.☆17Jan 11, 2022Updated 4 years ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 6 years ago
- Security Monitoring Resolution Categories☆137Nov 25, 2021Updated 4 years ago
- Reapsaw is a continuous security devsecops tool, which helps in enabling security into CI/CD Pipeline. It supports coverage for multiple …☆41Sep 23, 2020Updated 5 years ago
- ☆11Feb 25, 2023Updated 3 years ago
- Sentinel BEC IR☆14Aug 18, 2022Updated 3 years ago
- Automatically exported from code.google.com/p/lfimap☆16Mar 5, 2016Updated 10 years ago
- python and honggfuzz☆26May 18, 2020Updated 5 years ago
- Threat Modeling Tool Extension for Penetration Tester (TMTe4PT)☆12Mar 2, 2022Updated 4 years ago
- Security Weaknesses in Machine Learning☆15Aug 14, 2023Updated 2 years ago
- generates weak passwords based on current date☆44Jun 27, 2024Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- C# port of LogServiceCrash☆46Oct 7, 2020Updated 5 years ago
- ☆18Jul 24, 2019Updated 6 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- CloudMapper helps you analyze your Amazon Web Services (AWS) environments.☆12Nov 8, 2021Updated 4 years ago