CISOfy / cisofy-security-policyLinks
This is the public security policy of CISOfy, with extra resources like security tools.
☆92Updated 5 years ago
Alternatives and similar repositories for cisofy-security-policy
Users that are interested in cisofy-security-policy are comparing it to the libraries listed below
Sorting:
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- CISOfy Handbook☆34Updated 9 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- ☆142Updated this week
- A web application to streamline the development of STIGs from SRGs☆81Updated 3 weeks ago
- A list of OPML Security Feeds☆76Updated 7 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆113Updated last month
- ☆48Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Cyber Defence Monitoring Course Suite :: Suricata, Arkime (and others in the past)☆107Updated last year
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆61Updated 3 weeks ago
- Build Automated Machine Images for MISP☆29Updated 2 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- Controls Assessment Specification☆70Updated 7 months ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 9 months ago
- The OpenDXL Ontology project is focused on the development of an open and interoperable cybersecurity messaging format for use with the O…☆76Updated 4 years ago
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- The currently released SimpleRisk source code.☆98Updated 2 months ago
- ☆34Updated 4 years ago
- A monitoring tool for certificate transparency of ProtonMail's SSL/TLS certificates☆51Updated 7 years ago
- ☆15Updated 6 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Updated 2 years ago
- Web-based sensor management suite☆20Updated 2 years ago
- ☆120Updated 2 weeks ago
- Tools to assist in forensicating docker☆84Updated 8 months ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated last month
- ☆52Updated 5 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 3 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago