CISOfy / cisofy-security-policyLinks
This is the public security policy of CISOfy, with extra resources like security tools.
☆92Updated 5 years ago
Alternatives and similar repositories for cisofy-security-policy
Users that are interested in cisofy-security-policy are comparing it to the libraries listed below
Sorting:
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 3 weeks ago
- CISOfy Handbook☆34Updated 9 years ago
- ☆141Updated 2 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆111Updated 2 weeks ago
- ☆48Updated 2 years ago
- a curated list of useful threat modeling resources☆140Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Automated daily scan using Nmap and report on the differences☆91Updated 7 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- The currently released SimpleRisk source code.☆98Updated 2 months ago
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆61Updated last week
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- A list of OPML Security Feeds☆76Updated 6 months ago
- Manageable report from lynis text output, in various formats.☆77Updated 7 months ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆33Updated 2 years ago
- A web application to streamline the development of STIGs from SRGs☆80Updated last week
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆103Updated 4 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆131Updated last month
- read the docs version of risk management☆26Updated 2 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 9 months ago
- A service to test mail servers for best practices.☆37Updated 7 years ago
- A curated threat modeling library collection☆22Updated last year
- SIAC is an enterprise SIEM built on open-source technology.☆116Updated 7 years ago
- Cyber Threat Intelligence Feeds☆69Updated last year
- A UNIX security auditing tool based on several security frameworks☆317Updated last month