cisagov / join-cisagovLinks
CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and physical risk to our critical infrastructure.
☆74Updated 10 months ago
Alternatives and similar repositories for join-cisagov
Users that are interested in join-cisagov are comparing it to the libraries listed below
Sorting:
- A set of guidelines and best practices for an awesome engineering team☆253Updated this week
- Search a filesystem for indicators of compromise (IoC).☆80Updated last month
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 5 months ago
- A site for CISA directives☆166Updated last year
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆44Updated this week
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- Resources, tools and utilities about Threat Intelligence☆73Updated 2 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆53Updated 3 years ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆162Updated this week
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 3 years ago
- President's Cup Cybersecurity Competition Challenges☆176Updated 3 weeks ago
- ☆90Updated this week
- Logs key Windows process performance metrics. #nsacyber☆68Updated 2 years ago
- public repo for github pages to display graphics☆106Updated 5 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆102Updated last year
- CISA's catalog of bad practices that are exceptionally risky.☆210Updated this week
- an awesome list of active defense resources☆125Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆125Updated 4 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 3 weeks ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- ☆58Updated this week
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆73Updated 2 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆44Updated 2 weeks ago
- CISA CSAF Security Advisories☆84Updated last week
- Template for building a packet sniffer☆14Updated last year
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆34Updated last year
- ☆62Updated 4 years ago
- pcaps of traffic for traffic analysis workshop☆86Updated 3 years ago
- Tool used to perform threat intelligence against packet data☆35Updated 7 months ago