CISOfy / handbookLinks
CISOfy Handbook
☆32Updated 8 years ago
Alternatives and similar repositories for handbook
Users that are interested in handbook are comparing it to the libraries listed below
Sorting:
- Tips to protect your personal and company data☆28Updated 5 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Checklists☆17Updated 8 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆51Updated 12 years ago
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 9 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- Next generation remote logging tool for ModSecurity, supporting native and JSON format.☆22Updated 7 years ago
- A service to test mail servers for best practices.☆37Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆61Updated this week
- Parse nmap scan data with Perl (official repo)☆36Updated 6 years ago
- Certificate Revocation List monitor☆44Updated 11 months ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- A Docker image for bits of Kali Linux☆31Updated 2 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Rumble Network Discovery API☆17Updated last year
- Pythonic interface to the Internet Storm Center / DShield API.☆28Updated 2 years ago
- The web site☆14Updated 2 years ago
- A static website template for security pages.☆52Updated 2 weeks ago
- A low/zero interaction ssh authentication logging honeypot☆23Updated 11 months ago
- This chef cookbook provides security configuration for mysql.☆27Updated last week
- apbleed☆24Updated 11 years ago
- My various configuration files for zsh, vim, tmux, etc.☆24Updated 3 years ago
- A standard allowing organizations to nominate security contact points and policies via DNS TXT records.☆32Updated last month
- Common code, such as validators and mixins, that are shared between ActiveModels in metasploit-framework and ActiveRecords in metasploit_…☆14Updated 3 months ago
- personal fork of OSINT tool recon-ng☆18Updated 7 years ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆15Updated last year
- A local scanner for vulnerable web applications☆40Updated last month
- Agent scanner for vulners.com☆92Updated this week