Karneades / awesome-security-card-gamesLinks
A curated list of security card games.
☆150Updated 5 months ago
Alternatives and similar repositories for awesome-security-card-games
Users that are interested in awesome-security-card-games are comparing it to the libraries listed below
Sorting:
- This repository is for tools, guides, cheatsheets, and anything else related to learning all different aspects of security.☆96Updated 3 years ago
- A curated list of tools for incident response. With repository stars⭐ and forks🍴☆254Updated this week
- A curated list of cyber security resources and tools.☆391Updated last month
- Protection of natural persons with regard to the processing of personal data and on the free movement of such data.☆237Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆65Updated 2 years ago
- A collection of sources of documentation and best practices to build and run a SOC☆67Updated 2 years ago
- A collection of awesome software, libraries, learning tutorials, documents and books, technical resources and cool stuff about Blue Team …☆47Updated 2 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆215Updated 9 months ago
- A curated list of Awesome Security Challenges.☆197Updated last year
- Free cybersecurity resources. Learn cybersecurity for free.☆98Updated 10 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆66Updated 3 months ago
- A curated list of tools useful within the field of cyber security, for both blue and red team operations.☆98Updated 11 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago
- A curated list of Awesome Threat Intelligence Blogs☆468Updated last month
- A curated list of Awesome Threat Intelligence blogs☆86Updated 2 years ago
- A curated list of annual cyber security reports☆753Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,087Updated this week
- The OWASP Vulnerable Web Applications Directory Project (VWAD) is a comprehensive and well maintained registry of all known vulnerable we…