Explore cybersecurity’s market dynamics through public companies, capital flows, acquisitions, and product segments.
☆92Jun 6, 2025Updated 9 months ago
Alternatives and similar repositories for awesome-business-of-cybersecurity
Users that are interested in awesome-business-of-cybersecurity are comparing it to the libraries listed below
Sorting:
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆26Oct 3, 2024Updated last year
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆29Feb 5, 2026Updated last month
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆263Jul 5, 2025Updated 8 months ago
- Curated resources, research, and tools for securing AI systems☆620Updated this week
- ☆55Jan 20, 2026Updated 2 months ago
- The ACSC CyberTools Plugins are build upon the functionality of the Constellation data visualisation platform to deliver enrichments suit…☆26Jul 26, 2023Updated 2 years ago
- Automated red-team toolkit for stress-testing LLM defences - Vector Attacks on LLMs (Gendalf Case Study)☆110Jul 30, 2025Updated 7 months ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- One Conference 2024☆111Oct 1, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- XMPro's repository focusing on generative AI agents and Multi-Agents.☆29Updated this week
- In-the-wild deepfake detection dataset☆13Mar 5, 2025Updated last year
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- My set of notes and resources for Microsoft and other exams☆15Oct 20, 2021Updated 4 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated last month
- Best practices check examples for creating CSA policies in SAP Focused Run☆41Feb 13, 2026Updated last month
- Windows操作系统版本检测工具,如果网络可达,Windows Server 2003 R2及其以上版本的 操作系统版本识别率理论上能达以100%☆11Mar 12, 2020Updated 6 years ago
- This is a repository that is meant to hold detections for various process injection techniques.☆34Mar 3, 2020Updated 6 years ago
- MCP Snitch is a macOS application that intercepts and monitors MCP server communications, providing security analysis, access control, an…☆93Oct 14, 2025Updated 5 months ago
- ☆11Aug 29, 2013Updated 12 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆19Dec 11, 2025Updated 3 months ago
- 📚 A curated list of awesome microVM resources☆46Dec 14, 2025Updated 3 months ago
- Code snippets to reproduce MCP tool poisoning attacks.☆193Apr 10, 2025Updated 11 months ago
- A GUI application for managing macOS launchd agents and daemons. Built with Tauri.☆44Updated this week
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events, …☆1,274Feb 5, 2026Updated last month
- AI Atlas Nexus: tooling to bring together resources related to governance of foundation models.☆115Updated this week
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- A security-first MCP server empowering AI agents to orchestrate Ghidra, Radare2, and YARA for automated reverse engineering.☆50Mar 13, 2026Updated last week
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- A curated collection of tools and resources for building security with a developer first approach.☆30Jul 29, 2022Updated 3 years ago
- WEBFANG, is my first CLI, a modular OSINT & Reconnaissance toolkit curated for Ethical Hackers and Red-Teamers. Sink fangs into web targe…☆106Mar 11, 2026Updated last week
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- ☆32Dec 3, 2025Updated 3 months ago
- Analyse Social Network of co-authors in DBLP website (https://dblp.uni-trier.de) using NetworkX.☆14May 27, 2020Updated 5 years ago
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆13Oct 28, 2025Updated 4 months ago
- CEH v13 exam resources & Tips☆38Jun 24, 2025Updated 8 months ago