0xdefendA / policiesView external linksLinks
Open source information security policies
☆16Jan 25, 2021Updated 5 years ago
Alternatives and similar repositories for policies
Users that are interested in policies are comparing it to the libraries listed below
Sorting:
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- Incident Notification Platform by @NC3-LU☆11Updated this week
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Security diagnostic quick start guide. Identifying the best measures and establishing specific security procedures for your organization.☆11May 29, 2019Updated 6 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- A specialized implementation of the Hierarchical Navigable Small World (HNSW) data structure adapted for efficient nearest neighbor looku…☆10Jan 26, 2026Updated 3 weeks ago
- SmartThings Honeywell TotalConnect Device☆12Dec 8, 2016Updated 9 years ago
- Jolly good library for SPIF/Label/Clearance handling☆11Jan 2, 2024Updated 2 years ago
- Description here☆12Aug 17, 2022Updated 3 years ago
- HP Data Protector Arbitrary Remote Command Execution☆11Aug 12, 2018Updated 7 years ago
- ☆10Apr 10, 2024Updated last year
- Passive Bitcoin Project☆10Aug 10, 2015Updated 10 years ago
- Five pillars of computational reproducibility☆11Feb 6, 2024Updated 2 years ago
- Powered by Library Genesis☆23Jun 4, 2016Updated 9 years ago
- SoapySDR Red Pitaya module☆10Oct 9, 2025Updated 4 months ago
- Sample of a Malicious baseband signed by Apple☆10May 12, 2022Updated 3 years ago
- A vulnerability assessment tool for system models☆13Oct 1, 2021Updated 4 years ago
- Research code and scripts used in the Silburt et al. (2021) EMNLP 2021 paper 'FANATIC: FAst Noise-Aware TopIc Clustering'☆11Jul 6, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- Python framework to solve crypto problems using grainofsalt and cryptominisat☆14May 24, 2022Updated 3 years ago
- ☆12Apr 3, 2014Updated 11 years ago
- ☆10Jan 28, 2026Updated 2 weeks ago
- A Python client for the Global CVE Allocation System.☆17Jan 31, 2026Updated 2 weeks ago
- INACTIVE - Experiment: A light-weight agent to get a port scan perspective into a useable place/format for security operations☆14Apr 10, 2023Updated 2 years ago
- A more generic version of https://github.com/dataarts/armsglobe for visualizing source/destination data☆10Jul 5, 2016Updated 9 years ago
- GPG Encrypts an IMAP folder☆12May 4, 2020Updated 5 years ago
- A Postfix filter which takes a piped message and submits it to Cuckoo Sandbox☆11Apr 3, 2016Updated 9 years ago
- active directory ssh pam integration for Azure AD☆11Jan 29, 2017Updated 9 years ago
- Ghidra's development plugins, scripts, contributing. Presentation☆13Aug 10, 2020Updated 5 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Dec 10, 2017Updated 8 years ago
- Export MISP attributes in Yara☆12Sep 15, 2017Updated 8 years ago
- tools for creating, inspecting and modifying torrent files☆13Jun 1, 2022Updated 3 years ago
- ☆14Dec 6, 2023Updated 2 years ago
- A libre software which is providing a backend architecture for collecting data from probes and storing proof of checks.☆11Jan 16, 2026Updated last month
- 1998 implementation of PPP + TCP/IP + various network apps for ZX Spectrum 48k☆10Apr 22, 2016Updated 9 years ago
- IoC Feed for security analysts etc.☆13Feb 1, 2023Updated 3 years ago
- x64dbg Malware Plugin. Detect malicious materials☆16Jun 13, 2020Updated 5 years ago
- Gitlab to Fogejo migration script☆17Jan 10, 2026Updated last month