CISOfy Handbook
☆35Sep 15, 2016Updated 9 years ago
Alternatives and similar repositories for handbook
Users that are interested in handbook are comparing it to the libraries listed below
Sorting:
- Tips to protect your personal and company data☆27May 14, 2020Updated 5 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆93May 14, 2020Updated 5 years ago
- Checklists☆16Sep 22, 2016Updated 9 years ago
- DDoS Hack Tools Pack☆14Nov 16, 2020Updated 5 years ago
- Ansible Role for PHP and PHP-FPM☆18Mar 27, 2015Updated 10 years ago
- Docker details and examples for the Lynis project☆28Oct 16, 2016Updated 9 years ago
- macOS Development Environment Setup☆17Apr 6, 2021Updated 4 years ago
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- Ansible Role for Firewall & Persistence☆26Jun 3, 2016Updated 9 years ago
- Maltego entity pack encompassing the entire STIX 1.2 data model and a targeted subset of the CybOX 2.1 data model☆11Mar 24, 2016Updated 9 years ago
- Ansible Shell tool☆14Jan 19, 2018Updated 8 years ago
- A curated list of awesome threat detection and hunting resources☆16Sep 12, 2018Updated 7 years ago
- Travis builds for certbot.eff.org☆12Jan 19, 2022Updated 4 years ago
- Example Ansible Role for SSL☆31Aug 6, 2015Updated 10 years ago
- On-prem GitHub Actions runners, backed by Kubernetes☆36Jan 18, 2022Updated 4 years ago
- ☆21Nov 5, 2011Updated 14 years ago
- ⚡️ A curated list of awesome things related to Infisical☆23Oct 16, 2023Updated 2 years ago
- A template repo used by Autonomous Systems and Robotics Group for ML projects☆16Mar 8, 2023Updated 3 years ago
- EA-HAS-Bench: Energy-Aware Hyperparameter and Architecture Search Benchmark (ICLR Spotlight 2023)☆18Dec 8, 2024Updated last year
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- Ansible Role for SSH☆12Feb 15, 2015Updated 11 years ago
- Windows Network File System Remote exploit for CVE-2022-30136☆14Jul 11, 2023Updated 2 years ago
- ☆17Feb 16, 2024Updated 2 years ago
- ☆15Aug 8, 2021Updated 4 years ago
- 🐰 Rust client library for the Leap Edge socket service☆12Oct 8, 2023Updated 2 years ago
- Java implementation of Paillier algorithm. This is one of the few known system that preserves additive homomorphic properties. JCA Pailli…☆11Jan 29, 2019Updated 7 years ago
- Mix Network Bibliography☆15Feb 6, 2020Updated 6 years ago
- ansible-playbook. Add and configure zabbix-agent.☆13Sep 18, 2023Updated 2 years ago
- Find open databases - Powered by Binaryedge.io☆14Jan 4, 2020Updated 6 years ago
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Playground for ZoKrates ZK Snark toolbox for Ethereum☆15May 24, 2019Updated 6 years ago
- Homomorphic Encryption Randomness Beacon☆13Dec 3, 2019Updated 6 years ago
- Scripts to recursively search for, then convert .htaccess files to a single httpd.conf☆33Oct 30, 2011Updated 14 years ago
- Simple IRC Bot for flooding☆11Sep 12, 2011Updated 14 years ago
- 📟🤖 PagerDuty Discord Webhook Relay☆15Nov 11, 2022Updated 3 years ago
- Hacky code for extracting calls in DLLs by function☆17Jun 3, 2022Updated 3 years ago
- MSR Gamut: A Design Probe to Understand How Data Scientists Understand Machine Learning Models☆16Updated this week
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago