CISOfy / cisofy-security-policy
This is the public security policy of CISOfy, with extra resources like security tools.
☆81Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for cisofy-security-policy
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆52Updated this week
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated last year
- ☆139Updated 5 months ago
- Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common …☆27Updated 3 months ago
- A list of OPML Security Feeds☆66Updated last year
- Agent scanner for vulners.com☆86Updated last month
- Learn you a book for some infosec good☆62Updated 4 years ago
- Threat Feed Aggregation, Made Easy☆166Updated 4 years ago
- ☆126Updated 3 weeks ago
- Please use https://github.com/veeral-patel/true-positive instead☆65Updated last year
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆45Updated 6 years ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Legal, procedural and policies document templates for operating an IRT☆63Updated 7 months ago
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆55Updated last month
- automate your MISP installs☆66Updated 4 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆113Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 6 years ago
- Cyber Threat Intelligence Feeds☆64Updated 6 months ago
- Evolving directions on building the best Open Source Forensics VM☆159Updated 6 years ago
- ☆48Updated 4 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Salt States for Configuring the SIFT Workstation☆96Updated this week
- Automatically exported from code.google.com/p/nipper-ng☆66Updated 2 years ago
- Controls Assessment Specification☆65Updated 5 months ago
- A collection of notebooks built for defensive and offensive operations.☆76Updated 4 years ago
- a curated list of useful threat modeling resources☆124Updated 4 months ago
- ☆43Updated last year