/lil-scrapes

Little web scrapes, with Python and BS4

Primary LanguagePythonMIT LicenseMIT

/* Preamble */

Web scrapes, with python and bs4.

  • sans-pdf-scrape.py

--

/* lil-scrapes */

sans-pdf-scrape.py : A quick script for retrieving all (88, at time of writing) SANS whitepapers from sans.org.

Output:

admins-documentation-hackers-pentest-33303.pdf
aligning-information-risk-management-approach-bs-7799-3-2005-1664.pdf
analyzing-enterprise-pki-deployments-33284.pdf
application-audit-process-guide-information-security-professionals-1534.pdf
application-nsa-infosec-assessment-methodology-1045.pdf
application-security-information-assurances-neglected-stepchild-blueprint-risk-assess-56.pdf
art-reconnaissance-simple-techniques-60.pdf
auditing-aspnet-applications-pci-dss-compliance-33869.pdf
auditing-corporate-log-server-2079.pdf
auditing-enterprise-port-scanning-related-tools-75.pdf
auditing-in-depth-solaris-1237.pdf
auditing-nokia-firewall-32808.pdf
auditing-policy-compliance-qualysguard-cis-benchmarks-33609.pdf
auditing-vulnerability-tools-identify-todays-threats-business-performance-35642.pdf
auditing-windows-environments-powershell-xml-output-windows-security-ossams-33854.pdf
auditing-windows-installed-software-command-line-scripts-37412.pdf
base64-pwned-33759.pdf
base-security-assessment-methodology-1587.pdf
case-study-trusecure-security-certification-845.pdf
certification-accreditation-madmans-dilemma-controls-1971.pdf
checklist-audit-docker-containers-37437.pdf
choosing-corporate-level-instant-messaging-system-implementing-audit-controls-33463.pdf
conducting-electronic-information-risk-assessment-gramm-leach-bliley-act-compliance-1053.pdf
conducting-penetration-test-organization-67.pdf
conducting-security-audit-oracle-database-19.pdf
creating-comprehensive-vulnerability-assessment-program-large-company-qualysguard-2139.pdf
data-centric-quantitative-computer-security-risk-assessment-1209.pdf
defending-weaponization-trust-defense-in-depth-assessment-tls-37145.pdf
defining-risk-assessment-process-federal-security-personnel-671.pdf
distributed-scan-model-enterprise-wide-network-vulnerability-assessment-74.pdf
eaudit-designing-generic-tool-review-entitlements-36027.pdf
effective-case-modeling-security-information-event-management-33319.pdf
evaluating-untrusted-software-controlled-environment-79.pdf
filling-gaps-37182.pdf
footprinting-it-it-why-62.pdf
footprint-intranet-61.pdf
framework-assessing-20-critical-controls-iso-15504-cobit-5-process-assessment-model-36067.pdf
guide-find-cardholder-data-automated-tools-pci-assessors-35477.pdf
guide-security-metrics-55.pdf
how-to-linux-system-auditing-easier-81.pdf
information-classification-who-846.pdf
information-security-auditing-tool-37085.pdf
information-system-security-evaluation-team-security-insurance-58.pdf
information-systems-security-architecture-approach-layered-protection-1527.pdf
information-systems-security-architecture-approach-layered-protection-1532.pdf
institutional-comprehensive-auditing-strategies-1145.pdf
introduction-information-system-risk-management-1204.pdf
methodology-firewall-reviews-pci-compliance-34195.pdf
network-host-based-vulnerability-assessments-introduction-cost-effective-easy-1200.pdf
nss-nds-1981.pdf
outsourced-information-technology-environment-audit-33338.pdf
overview-threat-risk-assessment-76.pdf
palo-alto-firewall-security-configuration-benchmark-35777.pdf
patched-not-35912.pdf
perspective-threats-risk-analysis-process-63.pdf
port-scanning-techniques-defense-70.pdf
post-acquisition-audit-30-days-33098.pdf
practical-guide-auditing-asp-1623.pdf
proactive-vulnerability-assessments-nessus-78.pdf
qualitative-risk-analysis-management-tool-cramm-83.pdf
quantitative-risk-analysis-step-by-step-849.pdf
red-teaming-art-ethical-hacking-1272.pdf
sarbanes-oxley-information-technology-compliance-audit-1624.pdf
scoping-security-assessments-project-management-approach-33673.pdf
security-assessment-guidelines-financial-institutions-993.pdf
security-auditing-continuous-process-1150.pdf
security-program-management-risk-1061.pdf
seeking-security-paradigm-government-agencies-77.pdf
simple-windows-batch-scripting-intrusion-discovery-33193.pdf
strategies-improving-vulnerability-assessment-effectiveness-large-organizations-1072.pdf
successful-siem-log-management-strategies-audit-compliance-33528.pdf
system-identification-vulnerability-assessment-65.pdf
taxonomy-information-systems-audits-assessments-reviews-1801.pdf
triaging-enterprise-application-security-assessments-37387.pdf
understanding-service-organizations-ssae-34475.pdf
vpnscan-extending-audit-compliance-perimeter-1711.pdf
vulnerability-assessment-tools-develop-octave-risk-profile-1353.pdf
wifi-backtrack-2038.pdf
wireless-network-audits-open-source-tools-1235.pdf
wireless-networks-windows-registry-computer-been-33659.pdf