Tools to measure the maturity of Enterprise Security Architecture processes
☆13Sep 22, 2017Updated 8 years ago
Alternatives and similar repositories for ESA-Process-Maturity
Users that are interested in ESA-Process-Maturity are comparing it to the libraries listed below
Sorting:
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 3 years ago
- Handy scripts developed and discussed on http://auditcasts.com☆19Aug 19, 2019Updated 6 years ago
- Threat Mitigation Strategies☆28Feb 18, 2026Updated last week
- ☆12Feb 19, 2026Updated last week
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- A repository of Labs and other information for learning how PowerShell can help with infosec☆17Nov 3, 2015Updated 10 years ago
- Find potential Indicators of Compromise among similar Linux servers☆29Oct 28, 2017Updated 8 years ago
- ☆28Mar 29, 2022Updated 3 years ago
- Network Appliance Backups in PowerShell☆29Jan 5, 2023Updated 3 years ago
- Create a cool process tree like https://twitter.com/ACEResponder.☆35Mar 1, 2023Updated 2 years ago
- Rethinking the User Interface of AI☆32Updated this week
- ☆13Nov 5, 2024Updated last year
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- ☆13Feb 12, 2017Updated 9 years ago
- Defining requirements formally and checking them when simulating☆15Feb 14, 2025Updated last year
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- A downloadable pdf containing summary of frequently used pandas operations.☆10Sep 26, 2020Updated 5 years ago
- ☆16May 13, 2021Updated 4 years ago
- Building production-ready Retrieval-Augmented Generation (RAG) systems with LangGraph orchestration and local Ollama models for privacy-p…☆23Feb 16, 2026Updated last week
- ☆19Jan 15, 2026Updated last month
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year
- A collection of threat intelligence data such as IOC, Yara and Snort/Suricata Rules etc.☆10Sep 17, 2019Updated 6 years ago
- A PE morphing tool that allows you to mimic one executable file to another.☆11Dec 6, 2023Updated 2 years ago
- Python class calculating VaR and Monte Carlo Simulation☆10Dec 30, 2019Updated 6 years ago
- ☆14Jan 10, 2025Updated last year
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Disk Image Mounting Script☆11Jan 22, 2026Updated last month
- ☆10Jan 17, 2022Updated 4 years ago
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago
- ☆14Feb 8, 2020Updated 6 years ago
- AI-Powered RSS Content Filter - Automatically remove ads, sponsored content, and low-quality articles from your FreshRSS feeds using LLM …☆27Nov 1, 2025Updated 3 months ago
- [NAACL'25] "Revealing the Barriers of Language Agents in Planning"☆13Jun 22, 2025Updated 8 months ago
- Monte Carlo Simulation for Forecasting Cycle Times with a Python Jupyter Notebook☆11Dec 9, 2022Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- ☆11May 2, 2022Updated 3 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago