CloudSecurityAlliance / ctpdLinks
Cloud Trust Protocol Server
☆11Updated 10 years ago
Alternatives and similar repositories for ctpd
Users that are interested in ctpd are comparing it to the libraries listed below
Sorting:
- DefectDojo Documentation☆17Updated 4 years ago
- Ansible role to deploy Cyberark Central Policy Manager☆15Updated last year
- Identifies unexpected and prohibited certificate authority certificates on Windows systems. #nsacyber☆113Updated 9 years ago
- OpenDXL Console is a high-level web-based console for interacting with a DXL fabric☆11Updated 4 years ago
- Tools for security content automation, baseline tailoring, and overlay development.☆45Updated last year
- CARET - A tool for viewing cyber analytic relationships☆26Updated 5 years ago
- ☆36Updated 5 years ago
- ☆12Updated 8 years ago
- Configuration guidance for implementing BitLocker. #nsacyber☆127Updated 6 years ago
- The OVAL Language Schemas☆87Updated last year
- WALKOFF-enabled applications. #nsacyber☆143Updated 6 years ago
- Coding samples using the Kenna Security Platform REST API. All the code samples in this GitHub repository are offered “as is” and include…☆31Updated 6 months ago
- Docker files for Security Onion☆42Updated 5 years ago
- Pre-configured environment that supports the development and running of OpenDXL solutions☆13Updated 4 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14Updated 3 years ago
- Maltego transforms for the ThreatCrowd search API☆47Updated 7 years ago
- Controls Assessment Specification☆70Updated 10 months ago
- Node.js SDK for IBM X-Force Exchange☆15Updated 7 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago
- Best practices in threat intelligence☆50Updated 3 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Understand OVAL results in a blink of an eye☆35Updated 3 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- ☆95Updated this week
- Alienvault OTX Bro IDS Connector☆78Updated 10 years ago
- Automatically scores how well Windows systems have implemented some of the top 10 Information Assurance mitigation strategies. #nsacyber☆76Updated 9 years ago
- The OWASP Top 5 Machine Learning Risks[edit | edit source] The idea is to build the required resources which help software security comm…☆30Updated 7 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated 2 months ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- OASIS TC Open Repository: Providing a collection of CTI-related training materials☆50Updated 4 years ago