CISOfy / handbook
CISOfy Handbook
☆30Updated 8 years ago
Alternatives and similar repositories for handbook:
Users that are interested in handbook are comparing it to the libraries listed below
- Tips to protect your personal and company data☆27Updated 4 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆83Updated 4 years ago
- Checklists☆15Updated 8 years ago
- This is the Lynis Software Development Kit (SDK), to help creating custom tests and improve code quality.☆55Updated last month
- Mattermost - Shodan Slash command☆31Updated 7 years ago
- ☆11Updated 4 years ago
- A service to test mail servers for best practices.☆36Updated 6 years ago
- The web site☆15Updated last year
- our server-side sysctl.conf kernel parameters, as currently deployed☆20Updated 3 years ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- Lab generation for final project in EC521. Used to teach students how to use some popular and powerful OSINT tools such as Maltego, h8mai…☆11Updated 5 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- Packer.io Scripts to build the SIFT VM(s)☆11Updated 4 years ago
- ArchStrike ISO☆8Updated 2 years ago
- Build Automated Machine Images for MISP☆28Updated last year
- (Unofficial) Python API for http://checkusernames.com☆13Updated 10 years ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Updated 5 years ago
- Maltego integration of https://clearbit.com☆36Updated 4 years ago
- ☆22Updated 4 years ago
- ☆19Updated 5 years ago
- a collection of lynis plugins☆24Updated 6 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 2 years ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆47Updated 11 years ago
- The RIPE NCC DNS Monitoring Service (DNSMON) provides a comprehensive, objective and up-to-date overview of the quality of the service of…☆29Updated 6 months ago
- A generic log anonymizer☆20Updated 3 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 8 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 3 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 7 years ago