CISOfy / cisofy-security-policyLinks
This is the public security policy of CISOfy, with extra resources like security tools.
☆92Updated 5 years ago
Alternatives and similar repositories for cisofy-security-policy
Users that are interested in cisofy-security-policy are comparing it to the libraries listed below
Sorting:
- CISOfy Handbook☆32Updated 8 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 3 weeks ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated 11 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆107Updated last week
- ☆138Updated last week
- A curated threat modeling library collection☆22Updated last year
- The currently released SimpleRisk source code.☆97Updated 3 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A web application to streamline the development of STIGs from SRGs☆78Updated last month
- A list of OPML Security Feeds☆75Updated 4 months ago
- ioc2rpz is a place where threat intelligence meets DNS.☆110Updated 6 months ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆33Updated last year
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- ☆48Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆147Updated 3 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆50Updated 7 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆61Updated last week
- Privacy Cards for Software Developers☆53Updated 6 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- a curated list of useful threat modeling resources☆137Updated last year
- Build Automated Machine Images for MISP☆28Updated 2 years ago
- Files vetted, and approved for public release☆53Updated last year
- Scan domains and return data based on trustworthy email best practices☆211Updated last week
- A UNIX security auditing tool based on several security frameworks☆317Updated 2 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- ☆52Updated 5 years ago
- Python library used by CIRCLean (the USB sanitizer) and others☆55Updated last year
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆42Updated 3 years ago
- Linux file read monitor☆90Updated last year