☆11May 30, 2021Updated 4 years ago
Alternatives and similar repositories for ISO-27002-Document
Users that are interested in ISO-27002-Document are comparing it to the libraries listed below
Sorting:
- ☆19Jun 16, 2021Updated 4 years ago
- ☆14Aug 16, 2021Updated 4 years ago
- ☆16Jul 19, 2021Updated 4 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- ☆29Aug 12, 2021Updated 4 years ago
- Repository to put my notes related to OSCP certification☆20Aug 29, 2019Updated 6 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- ☆18Sep 2, 2021Updated 4 years ago
- Automatic cloud backup of Kali Linux data☆12Feb 27, 2020Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆13Nov 22, 2022Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Jun 28, 2023Updated 2 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- ☆27Mar 25, 2021Updated 4 years ago
- ☆20May 18, 2022Updated 3 years ago
- ☆45Oct 19, 2021Updated 4 years ago
- ☆24Oct 12, 2021Updated 4 years ago
- ☆76Aug 19, 2021Updated 4 years ago
- C2Matrix Automation☆15Sep 10, 2023Updated 2 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- PNPT Exam Preparation - TCM Security☆171Jul 25, 2021Updated 4 years ago
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆18Nov 26, 2025Updated 3 months ago
- eLearnSecurity Certified Exploit Development☆105Jul 25, 2021Updated 4 years ago
- ☆103Aug 31, 2021Updated 4 years ago
- T-Guard Repository☆18May 2, 2024Updated last year
- git for the owasp books project; setting up processes capabilities for publishing OWASP books☆19Aug 17, 2018Updated 7 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- ☆13Nov 4, 2019Updated 6 years ago
- ☆158Sep 20, 2021Updated 4 years ago
- ☆111May 30, 2021Updated 4 years ago
- A curated list of Awesome Threat Intelligence resources☆19Mar 27, 2019Updated 6 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- Hackthebox, Vulnhub, TryHackMe and Real World PenTest☆127Sep 8, 2020Updated 5 years ago
- ☆18Mar 13, 2022Updated 3 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Jun 19, 2024Updated last year
- ☆25Dec 7, 2024Updated last year
- Reference sheet for Threat Hunting Professional Course☆26Mar 10, 2019Updated 6 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆25Nov 18, 2025Updated 3 months ago
- ☆210Mar 4, 2022Updated 4 years ago