A set of guidelines and best practices for an awesome engineering team
☆273Mar 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for development-guide
Users that are interested in development-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated this week
- A skeleton project for quickly getting a new cisagov Python library started.☆31Mar 27, 2026Updated 2 weeks ago
- Cybersecurity Evaluation Tool☆1,805Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,380Updated this week
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆75Nov 20, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Dec 27, 2022Updated 3 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Mar 27, 2026Updated 2 weeks ago
- External monitoring for organization assets☆421Jun 5, 2024Updated last year
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆20Apr 6, 2026Updated last week
- Search a filesystem for indicators of compromise (IoC).☆85Updated this week
- A skeleton project for quickly getting a new cisagov Docker container started.☆21Apr 7, 2026Updated last week
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated 2 months ago
- Generate HTTPS reports based on scan data☆15Mar 30, 2026Updated 2 weeks ago
- Docker container for the gophish phishing framework.☆54Mar 30, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CISA's catalog of bad practices that are exceptionally risky.☆209Mar 26, 2026Updated 2 weeks ago
- CyHy Dashboard☆25Apr 3, 2026Updated last week
- A tool for detecting sensitive data in code repositories☆18Mar 26, 2026Updated 2 weeks ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Mar 9, 2026Updated last month
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆24Updated this week
- Test a host for susceptibility to CVE-2019-19781☆109Oct 23, 2020Updated 5 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 8 months ago
- A Django-based domain name registrar that interfaces with an EPP registry☆83Updated this week
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Mar 12, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Scan domains and return data based on trustworthy email best practices☆220Mar 10, 2026Updated last month
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆425May 10, 2024Updated last year
- Various Write Ups from OverTheWire, TryHackMe, HackTheBox, CrackMes.one and more!☆12Dec 25, 2022Updated 3 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- Phishing campaign docker composition for Gophish☆44Updated this week
- A small utility that keeps your Git repositories from leaking secrets, skipping hooks, or quietly drifting out of compliance. It’s design…☆34Mar 5, 2026Updated last month
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆14Mar 29, 2016Updated 10 years ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,409Updated this week
- UNO Community Partnership Intiative☆13Feb 28, 2026Updated last month
- AIL project training materials☆39Feb 24, 2026Updated last month
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,212Feb 20, 2026Updated last month
- Automated pshtt, trustymail, and sslyze scanning☆30Mar 26, 2026Updated 2 weeks ago
- ☆12Jul 14, 2025Updated 9 months ago