andrewk10 / AutoCompliance
Automating the Implementation of a Cybersecurity Governance, Risk and Compliance Programme using Distributed Ledger Technologies
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for AutoCompliance
- A curated list of Cloud Security techniques and tools☆30Updated last year
- Appilot is a Platform for ready to use Social Media Automation Bots on Real Devices, Android and Emulators. NO ADB, NO LAPTOP Needed.☆18Updated 3 weeks ago
- Open YARA scan- and search engine☆17Updated last week
- Automate the regular transfer of AIS data into a MISP Server☆6Updated 5 months ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆15Updated 3 years ago
- The official Prelude-Correlator GitHub mirror of https://www.prelude-siem.org/projects/prelude-correlator/repository☆10Updated 3 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- Bugs Framework☆6Updated this week
- Cryptanalysis and attack library☆22Updated 2 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Setting up a training environment for MISP☆11Updated last year
- Readline is a pure go(golang) implementation for GNU-Readline kind library☆13Updated 3 years ago
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago
- Source code for the Binaries of OWASP WrongSecrets☆10Updated last week
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated last year
- Standardizing Security Titles☆13Updated last year
- A collection of personal ZAP scripts☆13Updated last year
- Automatic generator of YARA modules based in protocol buffers☆14Updated 2 months ago
- Automated dynamic security analysis by emulation of IoT firmware images in CI-pipelines.☆11Updated 3 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆18Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆13Updated 3 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- vyos based isolation of networks☆11Updated 4 years ago