CISOfy / cisofy-security-policyLinks
This is the public security policy of CISOfy, with extra resources like security tools.
☆92Updated 5 years ago
Alternatives and similar repositories for cisofy-security-policy
Users that are interested in cisofy-security-policy are comparing it to the libraries listed below
Sorting:
- CISOfy Handbook☆33Updated 9 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- ioc2rpz is a place where threat intelligence meets DNS.☆111Updated 8 months ago
- A web application to streamline the development of STIGs from SRGs☆79Updated 2 weeks ago
- Tools for security content automation, baseline tailoring, and overlay development.☆44Updated last year
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆108Updated last month
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A list of OPML Security Feeds☆76Updated 6 months ago
- ☆139Updated 2 months ago
- The currently released SimpleRisk source code.☆97Updated last month
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆62Updated 2 months ago
- ☆48Updated 2 years ago
- SIAC is an enterprise SIEM built on open-source technology.☆116Updated 6 years ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Collection of best practices to add OSINT into MISP and/or MISP communities☆66Updated 2 years ago
- Web-based sensor management suite☆20Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated last week
- a curated list of useful threat modeling resources☆137Updated last year
- Manageable report from lynis text output, in various formats.☆77Updated 6 months ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆147Updated last month
- ☆52Updated 5 years ago
- generate lookalike domains using a few simple techniques (homoglyphs, alt TLDs, prefix/suffix)☆33Updated 2 years ago
- Controls Assessment Specification☆70Updated 6 months ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Linux file read monitor☆91Updated 2 years ago
- A curated threat modeling library collection☆22Updated last year
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago