Awesome List for Security Standards
☆31Jul 20, 2018Updated 7 years ago
Alternatives and similar repositories for AwesomeSecurityStandardsList
Users that are interested in AwesomeSecurityStandardsList are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- A collection of awesome security controls mapping for solutions across frameworks.☆57Jun 1, 2020Updated 5 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Jul 9, 2025Updated 9 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- A console tool for inspecting Windows Ancillary Function Driver sockets☆21May 15, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Multithreaded spraying of a password on all accounts of a domain.☆27Feb 11, 2025Updated last year
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Manage and maintain Defender XDR custom collection configuration☆35Nov 19, 2025Updated 4 months ago
- Leverage the Intel® Distribution of OpenVINO™ Toolkit to fast-track development of high-performance computer vision and deep learning inf…☆10Jul 28, 2020Updated 5 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- OSINT username checker☆50Jun 14, 2025Updated 10 months ago
- Thefatrat a massive exploiting tool revealed >> An easy tool to generate backdoor and easy tool to post exploitation attack like browser …☆10Jun 6, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- You’ve hardened your servers, locked down your website and are ready to take on the internet. But all your hard work was in vain, because…☆15Mar 6, 2017Updated 9 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 5 months ago
- https://hack.af/holidays☆16Jan 3, 2022Updated 4 years ago
- Visualize Microsoft Defender XDR process trees and security events☆33Aug 24, 2025Updated 7 months ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 9 years ago
- Create LAMP Stack using terraform with AWS☆11Feb 15, 2023Updated 3 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 4 months ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆17Feb 20, 2026Updated last month
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Oct 11, 2017Updated 8 years ago
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆108Jan 11, 2023Updated 3 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Source code for the experimental, compact "wee" file compression utility.☆13May 8, 2020Updated 5 years ago
- An interactive world-map that has been used in live Cyber Threat interfaces☆13Jul 31, 2021Updated 4 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆10Nov 29, 2025Updated 4 months ago
- ☆20Nov 23, 2022Updated 3 years ago
- Fetch all Honeypot☆12Oct 3, 2018Updated 7 years ago
- How to bypass your Bell Aliant provided modems.☆15Feb 2, 2026Updated 2 months ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- A checklist of items to check, especially when inheriting a foreign network.☆29Mar 6, 2019Updated 7 years ago
- Azure-Sentinel-BYOML☆13Nov 8, 2019Updated 6 years ago