Contains aggregated lists and information on cybersecurity topics
☆39Mar 21, 2025Updated last year
Alternatives and similar repositories for cybersecurity
Users that are interested in cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆40Apr 9, 2026Updated 3 weeks ago
- NIST Cybersecurity Framework (CSF) Profile Assessment Tool - Track controls, assign ownership, document findings, score security states, …☆34Updated this week
- ☆15Oct 6, 2024Updated last year
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆19Apr 27, 2026Updated last week
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- A PoC backdoor that uses Gmail as a C&C server☆13Jun 28, 2020Updated 5 years ago
- Build security program documentation using Git and Markdown☆28Jan 26, 2026Updated 3 months ago
- Archive of the Information Secuity policy documentation for Greater Manchester CHC that conforms to ISO27001☆14Apr 19, 2020Updated 6 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆27Jul 10, 2024Updated last year
- You can gather useful information accounts by username across all types networks ( which also include social media)☆29Oct 19, 2023Updated 2 years ago
- This program is designed to pull relevant current news articles for keywords defined in a keywords.csv file. GRC professionals can use th…☆33Jul 31, 2024Updated last year
- ☆19Apr 8, 2023Updated 3 years ago
- ☆32Jan 11, 2023Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An index of publicly available and open-source threat detection rulesets.☆134Apr 17, 2025Updated last year
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆38Jul 10, 2017Updated 8 years ago
- ☆32Updated this week
- ☆42Jul 20, 2024Updated last year
- ☆10Feb 2, 2024Updated 2 years ago
- Threat Hunting Toolkit is a Swiss Army knife for threat hunting, log processing, and security-focused data science☆152Apr 1, 2026Updated last month
- Agentkube - Run Kubernetes Like Never Before☆38Mar 1, 2026Updated 2 months ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆41Feb 25, 2026Updated 2 months ago
- burpsuite extension to analyze javascript files using semgrep☆12Feb 3, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A collection of scripts designed to secure/harden Linux based distributions☆12Nov 2, 2025Updated 6 months ago
- Beer-ISAC Community Resources☆27Jan 22, 2021Updated 5 years ago
- Python script to create CSV, HTML & PDF filtered for repo tags☆13Jul 26, 2024Updated last year
- List of resources for buiding a home lab☆313Aug 22, 2023Updated 2 years ago
- ☆14May 30, 2024Updated last year
- Picarch is a Python project for face detection and image similarity search using insightface and PostgreSQL.☆14Apr 8, 2025Updated last year
- TCM PEH Course AD Lab Build Script (Hydra-DC, Punisher-Workstation, Spiderman-Workstation)☆152Mar 20, 2024Updated 2 years ago
- A web scrape of Darknetlive. Incognito Market admin has removed the news page. This scrape has everything including the news.☆31Dec 17, 2024Updated last year
- Port Invaders is an arcade-style educational game designed to help you learn and memorize common networking port numbers. Whether you're …☆19Sep 4, 2023Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- "Very simple but works well" Computer Vision based ID verification solution provided by LibraX.☆45Mar 23, 2021Updated 5 years ago
- VPN Comparison Spreadsheet. Originally contained a comparison of 95 different VPN Providers.☆33Sep 28, 2021Updated 4 years ago
- V-USB Library based project - Send a string to your ATtiny85 via USB, press a button and have it typed back via HID Keyboard☆13Jan 6, 2019Updated 7 years ago
- EmailCrawl - is a professional-grade OSINT (Open Source Intelligence) tool designed for advanced email address extraction through compreh…☆164Jan 26, 2026Updated 3 months ago
- Check if container images in a Kubernetes cluster have arm architecture support.☆26Mar 19, 2026Updated last month
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆58Oct 22, 2021Updated 4 years ago
- Trello clone GraphQL Node.js backend☆11Aug 23, 2017Updated 8 years ago