PussInScreen / AutoCompliance
Automating the Implementation of a Cybersecurity Governance, Risk and Compliance Programme using Distributed Ledger Technologies
☆10Updated 2 years ago
Related projects: ⓘ
- A curated list of Cloud Security techniques and tools☆30Updated last year
- Zénith is a multi-lingual cybersecurity AI NLP security verification chatbot in development that references the MITRE ATT&CK Framework, O…☆1Updated last year
- Following repository contains source codes used in my two Books.☆10Updated 8 years ago
- Open YARA scan- and search engine☆15Updated last year
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 3 years ago
- Automate the regular transfer of AIS data into a MISP Server☆6Updated 3 months ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated last year
- A compiler for the Meta Attack Language☆15Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- ☆2Updated 5 months ago
- A mapping project between tags (annotations, labels) and domain names☆11Updated 4 months ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- vyos based isolation of networks☆11Updated 3 years ago
- Source code for the Binaries of OWASP WrongSecrets☆9Updated 2 months ago
- Decryption utility for PGP Whole Disk Encryption☆18Updated 3 years ago
- AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Ser…☆12Updated 2 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 9 months ago
- Create machine images containing the Nessus vulnerability scanner☆10Updated this week
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆18Updated 3 years ago
- Standardizing Security Titles☆13Updated last year
- ☆10Updated this week
- A repository for maintaining a list of the top domains based on multiple lists☆19Updated 2 years ago
- A tool for detecting sensitive data in code repositories☆13Updated 3 months ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago