CISOfy / cisofy-security-policy
This is the public security policy of CISOfy, with extra resources like security tools.
☆87Updated 4 years ago
Alternatives and similar repositories for cisofy-security-policy:
Users that are interested in cisofy-security-policy are comparing it to the libraries listed below
- ☆44Updated 2 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated 2 months ago
- CISOfy Handbook☆31Updated 8 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Implementing the CIS Critical Controls (almost) for Free☆85Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆37Updated 2 years ago
- ☆54Updated 3 years ago
- Evolving directions on building the best Open Source Forensics VM☆157Updated 6 years ago
- Find accounts using common and default passwords in Active Directory.☆66Updated 5 years ago
- Search a filesystem for indicators of compromise (IoC).☆70Updated 2 weeks ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆24Updated 4 years ago
- ☆132Updated 2 months ago
- ☆36Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆69Updated 2 years ago
- Scripts, SQL queries, and other resources for Nexpose☆28Updated this week
- Automated daily scan using Nmap and report on the differences☆91Updated 6 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆114Updated 7 months ago
- Ansible snippets and code for Lynis☆42Updated 6 years ago
- ☆52Updated 5 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 4 months ago
- Documentation on the Cyber Defense Matrix☆24Updated last year
- Tools for security content automation, baseline tailoring, and overlay development.☆43Updated 6 months ago
- A collection of notebooks built for defensive and offensive operations.☆77Updated 4 years ago
- ☆117Updated last year
- ☆48Updated 4 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆46Updated 7 years ago
- Agent scanner for vulners.com☆90Updated 4 months ago
- ioc2rpz is a place where threat intelligence meets DNS.☆108Updated last month
- A curated list of resources related to Industrial Control System (ICS) security.☆30Updated 8 years ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22Updated 9 months ago