Andy Allan (andyallan)

andyallan

Geek Repo

Location:Glasgow

Github PK Tool:Github PK Tool

Andy Allan's repositories

Stargazers:0Issues:1Issues:0

ansible-osx-command-line-tools

An Ansible role for installing OS X Command Line Tools

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

auditd

Best Practice Auditd Configuration

License:Apache-2.0Stargazers:0Issues:0Issues:0

auditd-attack

A Linux Auditd rule set mapped to MITRE's Attack Framework

License:MITStargazers:0Issues:0Issues:0

blue-team-wiki

Tools, techniques, cheat sheets, and other resources to assist those defending organizations and detecting adversaries

Language:HTMLStargazers:0Issues:0Issues:0
Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

cheat.sh

the only cheat sheet you need

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

Cloakify

CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

cloudmapper

CloudMapper helps you analyze your Amazon Web Services (AWS) environments.

Language:JavaScriptLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0

consoleme

A Central Control Plane for AWS Permissions and Access

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

CyberChef

The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis

Language:JavaScriptLicense:Apache-2.0Stargazers:0Issues:0Issues:0

dispatch

All of the ad-hoc things you're doing to manage incidents today, done for you, and much more!

Language:PythonLicense:Apache-2.0Stargazers:0Issues:0Issues:0

DumpsterFire

"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.

Language:PythonLicense:MITStargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

flan

A pretty sweet vulnerability scanner

Language:PythonLicense:BSD-3-ClauseStargazers:0Issues:0Issues:0
Language:HTMLLicense:GPL-3.0Stargazers:0Issues:0Issues:0

kubernetes-the-hard-way

Bootstrap Kubernetes the hard way on Google Cloud Platform. No scripts.

License:Apache-2.0Stargazers:0Issues:0Issues:0

mediumish-theme-jekyll

Jekyll Template - Mediumish

Language:JavaScriptLicense:MITStargazers:0Issues:0Issues:0

multi-git-status

Show uncommitted, untracked and unpushed changes for multiple Git repos

License:MITStargazers:0Issues:0Issues:0

response

Monzo's real-time incident response and reporting tool ⚡️

License:MITStargazers:0Issues:0Issues:0

ssh-audit

SSH server auditing (banner, key exchange, encryption, mac, compression, compatibility, security, etc)

Language:PythonLicense:MITStargazers:0Issues:0Issues:0

testssl.sh

Testing TLS/SSL encryption anywhere on any port

Language:ShellLicense:GPL-2.0Stargazers:0Issues:0Issues:0

trape

People tracker on the Internet: OSINT analysis and research tool by Jose Pino

Stargazers:0Issues:0Issues:0

webXray

webxray is a tool for analyzing third-party content on webpages and identifying the companies which collect user data.

Language:PythonLicense:GPL-3.0Stargazers:0Issues:0Issues:0