CISOfy / cisofy-security-policyLinks
This is the public security policy of CISOfy, with extra resources like security tools.
☆92Updated 5 years ago
Alternatives and similar repositories for cisofy-security-policy
Users that are interested in cisofy-security-policy are comparing it to the libraries listed below
Sorting:
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- CISOfy Handbook☆35Updated 9 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆115Updated 2 weeks ago
- A list of OPML Security Feeds☆76Updated 8 months ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- ☆49Updated 10 years ago
- A web application to streamline the development of STIGs from SRGs☆82Updated last month
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- ☆52Updated 6 years ago
- ☆49Updated 2 years ago
- ☆143Updated 3 weeks ago
- SIAC is an enterprise SIEM built on open-source technology.☆116Updated 7 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆33Updated 2 years ago
- Automated pshtt, trustymail, and sslyze scanning☆27Updated 3 weeks ago
- a curated list of useful threat modeling resources☆140Updated last year
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated last week
- The currently released SimpleRisk source code.☆98Updated 2 weeks ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Evolving directions on building the best Open Source Forensics VM☆161Updated 7 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- Files vetted, and approved for public release☆55Updated 2 years ago
- automate your MISP installs☆68Updated 5 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- A Simple QUEry and Report Tool☆142Updated 6 years ago
- PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ..…☆132Updated 2 months ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago