cisagov / join-cisagovLinks
CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and physical risk to our critical infrastructure.
☆75Updated last year
Alternatives and similar repositories for join-cisagov
Users that are interested in join-cisagov are comparing it to the libraries listed below
Sorting:
- A set of guidelines and best practices for an awesome engineering team☆261Updated 2 weeks ago
- Search a filesystem for indicators of compromise (IoC).☆81Updated last week
- A site for CISA directives☆167Updated last year
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆76Updated 9 months ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 4 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆47Updated 3 weeks ago
- CISA's catalog of bad practices that are exceptionally risky.☆211Updated 2 weeks ago
- CISA CSAF Security Advisories☆90Updated last week
- ☆94Updated last week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆52Updated last week
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated 2 weeks ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated last week
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- Resources, tools and utilities about Threat Intelligence☆75Updated 2 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 2 weeks ago
- Logs key Windows process performance metrics. #nsacyber☆68Updated 3 years ago
- an awesome list of active defense resources☆127Updated 5 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆76Updated 5 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆144Updated 2 years ago
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 2 months ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆402Updated 2 weeks ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated 2 months ago
- ☆64Updated 4 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- A cybersecurity game in Azure Data Explorer☆174Updated last year
- ☆55Updated 4 years ago
- President's Cup Cybersecurity Competition Challenges☆192Updated 4 months ago