andrewk10 / AutoCompliance
Automating the Implementation of a Cybersecurity Governance, Risk and Compliance Programme using Distributed Ledger Technologies
☆11Updated 2 years ago
Alternatives and similar repositories for AutoCompliance:
Users that are interested in AutoCompliance are comparing it to the libraries listed below
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- A curated list of Cloud Security techniques and tools☆29Updated last year
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- PowerShell Post-exploitation agent based on Mitre Att&ck framework☆12Updated 2 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- SSH brute-force script created for HackTheBox☆15Updated 5 years ago
- ☆11Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Updated last year
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- New version of the buildkit repository☆9Updated 2 years ago
- Collection of exploits that were verified by an automated system☆13Updated 3 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆12Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Repository of Information sharing on threats and indicators☆12Updated 5 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- ☆11Updated 8 years ago
- HoneyDB Python Module☆13Updated last year