Contains aggregated lists and information on cybersecurity topics
☆39Mar 21, 2025Updated last year
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below
Sorting:
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆39Mar 12, 2026Updated last week
- A light 'alarm' clock designed for gentle wake-up with increasing light intensity.☆17Jan 10, 2025Updated last year
- ☆15Oct 6, 2024Updated last year
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- A curated awesome list of lists of interview questions. Feel free to contribute!☆22Jul 24, 2024Updated last year
- Build security program documentation using Git and Markdown☆28Jan 26, 2026Updated last month
- Archive of the Information Secuity policy documentation for Greater Manchester CHC that conforms to ISO27001☆14Apr 19, 2020Updated 5 years ago
- You can gather useful information accounts by username across all types networks ( which also include social media)☆28Oct 19, 2023Updated 2 years ago
- ☆75Dec 29, 2025Updated 2 months ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆32Jul 31, 2024Updated last year
- ☆19Apr 8, 2023Updated 2 years ago
- An index of publicly available and open-source threat detection rulesets.☆130Apr 17, 2025Updated 11 months ago
- ☆31Jan 11, 2023Updated 3 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆36Jul 10, 2017Updated 8 years ago
- ☆41Jul 20, 2024Updated last year
- Cheatsheet from the PJPT course of TCM security.☆33Jan 15, 2024Updated 2 years ago
- Legal, procedural and policies document templates for operating MISP and information sharing communities☆38Jan 31, 2023Updated 3 years ago
- k8s ConfigMaps and Secrets Usage.☆11Jan 24, 2025Updated last year
- The agent for kube-advisor.io☆14Jan 28, 2025Updated last year
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆151Mar 1, 2026Updated 3 weeks ago
- All my slides for any talks☆23Oct 13, 2024Updated last year
- ☆11Mar 12, 2020Updated 6 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Dec 13, 2020Updated 5 years ago
- ☆37Dec 17, 2020Updated 5 years ago
- ☆15May 22, 2023Updated 2 years ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆41Feb 25, 2026Updated 3 weeks ago
- 🗺 A map of OSINT tools.☆20Jul 5, 2023Updated 2 years ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Beer-ISAC Community Resources☆26Jan 22, 2021Updated 5 years ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 4 months ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 7 months ago
- List of resources for buiding a home lab☆306Aug 22, 2023Updated 2 years ago
- [WIP] revamping the repo to publish on hugo themes☆13May 11, 2025Updated 10 months ago
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆150Mar 20, 2024Updated 2 years ago
- 🖥🚀 Web development explained for normal people!☆10Apr 22, 2024Updated last year
- "Very simple but works well" Computer Vision based ID verification solution provided by LibraX.☆44Mar 23, 2021Updated 4 years ago
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆18Sep 4, 2023Updated 2 years ago