Open source information security policies
☆16Jan 25, 2021Updated 5 years ago
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- Incident Notification Platform by @NC3-LU☆11Updated this week
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆11Mar 9, 2026Updated last week
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- GPG Encrypts an IMAP folder☆12May 4, 2020Updated 5 years ago
- Research code and scripts used in the Silburt et al. (2021) EMNLP 2021 paper 'FANATIC: FAst Noise-Aware TopIc Clustering'☆11Jul 6, 2023Updated 2 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- Username / Password list combo from my honeypot.☆14Apr 13, 2022Updated 3 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated 2 months ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- SoapySDR Red Pitaya module☆10Oct 9, 2025Updated 5 months ago
- A more generic version of https://github.com/dataarts/armsglobe for visualizing source/destination data☆10Jul 5, 2016Updated 9 years ago
- ☆10Jan 28, 2026Updated last month
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Powered by Library Genesis☆23Jun 4, 2016Updated 9 years ago
- ☆10Apr 10, 2024Updated last year
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated last month
- Ivanti Pulse Secure CVE-2023-46805 Scanner - Based on Assetnote's Research☆12Jan 19, 2024Updated 2 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- Jolly good library for SPIF/Label/Clearance handling☆11Jan 2, 2024Updated 2 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- IMEI generator used in Huawei modified firmware☆13May 16, 2022Updated 3 years ago
- ISP for the ABOV MC81F4204☆15May 22, 2017Updated 8 years ago
- This Pure Data patch uses the Paul stretch algorithm to time stretch musical recordings. It is suitable for extreme sound stretching of …☆12Sep 27, 2020Updated 5 years ago
- A high-performance tool for Zcash blockchain science and exploration☆10Jul 5, 2019Updated 6 years ago
- Gitlab to Fogejo migration script☆20Jan 10, 2026Updated 2 months ago
- Artefacts from various retefe campaigns☆10Mar 9, 2019Updated 7 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago