Awesome List for Security Standards
☆31Jul 20, 2018Updated 7 years ago
Alternatives and similar repositories for AwesomeSecurityStandardsList
Users that are interested in AwesomeSecurityStandardsList are comparing it to the libraries listed below
Sorting:
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆44Sep 8, 2020Updated 5 years ago
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- This program generates cyber attack scenarios for use in cyber training exercises, red team planning, blue team planning, automated attac…☆33Apr 15, 2021Updated 4 years ago
- Tools for the Computer Incident Response Team☆150Apr 17, 2017Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- OSCP Exam Report Template in Markdown☆34Oct 25, 2021Updated 4 years ago
- ☆42Dec 22, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated 2 weeks ago
- Self-hosted web service and application to test internet speed of a remote server/computer via Speedtest-CLI☆11Feb 23, 2026Updated 2 weeks ago
- ☆10Nov 29, 2025Updated 3 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- Azure-Sentinel-BYOML☆12Nov 8, 2019Updated 6 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆24Nov 12, 2025Updated 3 months ago
- Machine Learning-based tool for Cybersecurity Risk Assessment☆11Jul 18, 2021Updated 4 years ago
- A static analysis framework for NASL.☆14Nov 30, 2022Updated 3 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- PHP API wrapper for Pwinty.com☆11Jul 31, 2016Updated 9 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- ☆10Nov 21, 2023Updated 2 years ago
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Zeek script library for getting the effective TLD of a domain.☆13Apr 12, 2024Updated last year
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- Tools and Binaries to use with KAPE☆13Aug 13, 2019Updated 6 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago