Explore cybersecurity’s market dynamics through public companies, capital flows, acquisitions, and product segments.
☆93Mar 28, 2026Updated last month
Alternatives and similar repositories for awesome-business-of-cybersecurity
Users that are interested in awesome-business-of-cybersecurity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.☆26Oct 3, 2024Updated last year
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆266Jul 5, 2025Updated 9 months ago
- AI Security Newsletter - A monthly digest of AI security research, insights, reports, upcoming events, and tools & resources☆36Feb 5, 2026Updated 2 months ago
- Curated resources, research, and tools for securing AI systems☆683Apr 10, 2026Updated 3 weeks ago
- ☆60Jan 20, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Jan 28, 2021Updated 5 years ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆496Jun 12, 2025Updated 10 months ago
- One Conference 2024☆110Oct 1, 2024Updated last year
- Master PDF Summarization with Google Bard☆13Feb 29, 2024Updated 2 years ago
- XMPro's repository focusing on generative AI agents and Multi-Agents.☆31Apr 17, 2026Updated 2 weeks ago
- In-the-wild deepfake detection dataset☆14Mar 5, 2025Updated last year
- Demonstrates how a malicious dependency could negatively impact the build output.☆25Aug 11, 2023Updated 2 years ago
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 months ago
- ☆121May 26, 2025Updated 11 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Best practices check examples for creating CSA policies in SAP Focused Run☆41Apr 16, 2026Updated 2 weeks ago
- ☆24Dec 3, 2025Updated 4 months ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- Point of Concept: To help to automate the collection of evidence for SOC 2 Audits and etc.☆11May 13, 2024Updated last year
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 5 months ago
- OWASP Web Security Testing Guide RAG system with ChromaDB, MCP for Claude Code☆20Dec 11, 2025Updated 4 months ago
- 📚 A curated list of awesome microVM resources☆53Dec 14, 2025Updated 4 months ago
- Code snippets to reproduce MCP tool poisoning attacks.☆192Apr 10, 2025Updated last year
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,298Apr 6, 2026Updated 3 weeks ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆11Dec 11, 2017Updated 8 years ago
- WPA Attack - Easy breaking WPA WPA2 networks by typing one command☆21Jun 15, 2015Updated 10 years ago
- Useful scripts for maintaining multiple AWS Accounts☆45Dec 1, 2025Updated 4 months ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- This repo contains the codes for the experiments of the paper "AutoPenBench: Benchmarking Generative Agents for Penetration Testing".☆15Oct 28, 2025Updated 6 months ago
- 3dTermuxArch☆11Dec 9, 2022Updated 3 years ago
- 🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.☆11Mar 2, 2022Updated 4 years ago
- Project CodeGuard is an open-source, model-agnostic security framework that embeds secure-by-default practices into AI coding agent workf…☆145Apr 21, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆10Jan 21, 2019Updated 7 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Practicing PostgreSQL using real questions from FAANG interviews☆12Dec 12, 2021Updated 4 years ago
- Repository for CoSAI workstream 2, Preparing Defenders for a Changing Cybersecurity Landscape☆55Mar 11, 2026Updated last month
- ☆12Jun 7, 2025Updated 10 months ago
- ☆18Feb 13, 2026Updated 2 months ago
- ☆13Dec 8, 2022Updated 3 years ago