A set of guidelines and best practices for an awesome engineering team
☆271Feb 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for development-guide
Users that are interested in development-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated this week
- A skeleton project for quickly getting a new cisagov Python library started.☆31Mar 10, 2026Updated 2 weeks ago
- Cybersecurity Evaluation Tool☆1,787Updated this week
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,362Feb 19, 2026Updated last month
- CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and …☆75Nov 20, 2024Updated last year
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,429Dec 27, 2022Updated 3 years ago
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated this week
- External monitoring for organization assets☆421Jun 5, 2024Updated last year
- Search a filesystem for indicators of compromise (IoC).☆83Dec 30, 2025Updated 2 months ago
- A skeleton project for quickly getting a new cisagov Docker container started.☆21Mar 10, 2026Updated 2 weeks ago
- Generate HTTPS reports based on scan data☆15Feb 18, 2026Updated last month
- A community sourced list of log4j-affected software☆1,124Nov 9, 2022Updated 3 years ago
- Docker container for the gophish phishing framework.☆54Feb 18, 2026Updated last month
- CISA's catalog of bad practices that are exceptionally risky.☆208Feb 25, 2026Updated 3 weeks ago
- CyHy Dashboard☆25Mar 5, 2026Updated 2 weeks ago
- A tool for detecting sensitive data in code repositories☆18Feb 25, 2026Updated 3 weeks ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Mar 9, 2026Updated 2 weeks ago
- AWS infrastructure for Cyber Hygiene and BOD 18-01 scanning☆23Mar 16, 2026Updated last week
- Test a host for susceptibility to CVE-2019-19781☆109Oct 23, 2020Updated 5 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Mar 12, 2026Updated last week
- Scan domains and return data based on trustworthy email best practices☆218Mar 10, 2026Updated 2 weeks ago
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,741Oct 20, 2023Updated 2 years ago
- Cyber Incident Response Team Playbook Battle Cards☆425May 10, 2024Updated last year
- Terraform to deploy an assessment environment to the COOL☆16Mar 17, 2026Updated last week
- Gather domains as a precursor to scanning☆21Feb 18, 2026Updated last month
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Cybersecurity Incidents Mind Maps☆34Sep 29, 2021Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Jul 21, 2021Updated 4 years ago
- Automate Cobalt Strike keystore file for Teamserver SSL.☆11Feb 1, 2022Updated 4 years ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,392Updated this week
- A versatile image viewing environment for the internet.☆19Dec 1, 2025Updated 3 months ago
- UNO Community Partnership Intiative☆13Feb 28, 2026Updated 3 weeks ago
- AIL project training materials☆39Feb 24, 2026Updated last month
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,208Feb 20, 2026Updated last month
- Automated pshtt, trustymail, and sslyze scanning☆30Feb 18, 2026Updated last month
- Examples of various container types for Python and Golang☆16Aug 29, 2025Updated 6 months ago
- Expandable Defensive Cyber Operations Platform☆44Sep 28, 2022Updated 3 years ago
- Cloud-native SIEM for intelligent security analytics for your entire enterprise.☆20Apr 4, 2023Updated 2 years ago
- A DFIR tool written in Python.☆1,052Jun 9, 2021Updated 4 years ago