18F / vulnerability-disclosure-policy
The vulnerability disclosure policy for 18F and GSA's Technology Transformation Service.
☆27Updated 3 years ago
Alternatives and similar repositories for vulnerability-disclosure-policy:
Users that are interested in vulnerability-disclosure-policy are comparing it to the libraries listed below
- Repository for various tools around security☆42Updated 8 months ago
- Experimental OpenSSL wrapper for Python and SSLyze.☆39Updated 3 months ago
- Ruby API client for the Censys internet-wide network-scan search engine☆9Updated 6 months ago
- Certificate Revocation List monitor☆40Updated 7 months ago
- Compliance automation for cloud.gov☆36Updated 6 months ago
- A schema language for JSON documents that allows validation and compilation into various database engines☆40Updated 2 months ago
- Notes and reference for ongoing forecasting.☆16Updated 3 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- Some helper scripts to manage github orgs via API.☆34Updated last year
- Some tools for supporting OneCRL☆17Updated 3 weeks ago
- INACTIVE - http://mzl.la/ghe-archive - Vagrantfile and Dockerfiles that help make minion development and deployment far easier☆13Updated 6 years ago
- Docker container for Zachary Rice Gitleaks☆20Updated 5 years ago
- Service mapping API☆24Updated last year
- Signed list of OpenPGP fingerprints for First Look employees☆14Updated 2 months ago
- secure messaging, file-transfer, and directory synchronization☆41Updated 7 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- ☆198Updated 9 years ago
- Go wrapper for kroeckx/x509lint☆14Updated 3 years ago
- Top Level Domain data☆65Updated 5 years ago
- Community rules for Commit Watcher☆24Updated 8 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆70Updated 5 years ago
- This repository contains a sample script which can be used to enable security vulnerability alerts in all of the repositories in a given …☆80Updated 5 months ago
- experimental threat modeling tools☆14Updated 2 years ago
- Minion Frontend☆30Updated 6 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- cloud.gov security policies and procedures☆25Updated 7 months ago
- Server & client software for Firewall Cafe☆3Updated this week
- The web site☆14Updated last year
- Security audit tool for Encrypt.to☆14Updated 9 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 8 years ago