1. TrustymailScan domains and return data based on trustworthy email best practices
4. SparrowSparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 environment.
6. MalcolmMalcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files) and Zeek logs.
7. ChirpA forensic collection tool written in Python.
8. PshttScan domains and return data based on HTTPS best practices
9. CsetCybersecurity Evaluation Tool
10. check-your-pulseThis utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.
11. EpsilonThe Epsilon Algorithm Suite provides users a method to verify the integrity of the received GPS data and ranging signals, thereby improving resiliency against potential GPS signal loss.
13. log4j-scannerlog4j-scanner is a project derived from other members of the open-source community by CISA to help organizations identify potentially vulnerable web services affected by the log4j vulnerabilities.
15. scannerAutomated pshtt, trustymail, and sslyze scanning
22. findcdnfindCDN is a tool created to help accurately identify what CDN a domain is using.