CISA's catalog of bad practices that are exceptionally risky.
☆209Apr 27, 2026Updated 3 weeks ago
Alternatives and similar repositories for bad-practices
Users that are interested in bad-practices are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cybersecurity Evaluation Tool☆1,829May 13, 2026Updated last week
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- A set of guidelines and best practices for an awesome engineering team☆276May 11, 2026Updated last week
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆12May 29, 2017Updated 8 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆17Feb 11, 2017Updated 9 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CISA CSAF Security Advisories☆105Updated this week
- A site for CISA directives☆172Jun 5, 2024Updated last year
- USENIX 2023 Artifacts☆12Nov 25, 2022Updated 3 years ago
- Integrate IBM QRadar and RPA to automate security L1 tasks.☆14May 20, 2022Updated 4 years ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆17Mar 1, 2022Updated 4 years ago
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,574Updated this week
- 🚗 A curated list of resources for learning about vehicle security and car hacking☆15Oct 4, 2021Updated 4 years ago
- DevSecOps Guide, located devsecops.pagerduty.com☆14Apr 1, 2026Updated last month
- A scanner to detect the use of stolen FireEye red team tools☆20Dec 18, 2020Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆21Mar 8, 2021Updated 5 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆20Jun 11, 2019Updated 6 years ago
- Repository for AsBuiltReport Microsoft DHCP module☆15Jan 31, 2026Updated 3 months ago
- A skeleton project for quickly getting a new cisagov Python library started.☆31May 11, 2026Updated last week
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆26Apr 28, 2024Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Apr 24, 2026Updated 3 weeks ago
- ☆16May 13, 2021Updated 5 years ago
- Simple Python Elgamal Encryption and Decryption Tool☆10Jan 7, 2020Updated 6 years ago
- A curated list of tools for incident response☆21Sep 24, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Purple Team Strategies, Published by Packt☆16Apr 22, 2026Updated 3 weeks ago
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,429Dec 27, 2022Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38May 28, 2025Updated 11 months ago
- This repository contains generated contextual data utilized by pyattck.☆19Mar 3, 2025Updated last year
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆75Nov 20, 2024Updated last year
- ☆19Dec 31, 2022Updated 3 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- A collection of scripts used to support an OffSecOps pipeline.☆15Jan 31, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Jan 4, 2017Updated 9 years ago
- Documentation on the Cyber Defense Matrix☆27Apr 19, 2023Updated 3 years ago
- These are open source rules that can be utilized with QRadar to detect various types of threats in the environment.☆59Jun 11, 2019Updated 6 years ago
- Indicators of compromise relating to our report on APT10's targeting of global MSPs☆10Sep 26, 2017Updated 8 years ago
- A PowerShell module for incident response and threat hunting.☆38May 23, 2024Updated last year
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Apr 24, 2026Updated 3 weeks ago