cisagov / join-cisagov
CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and physical risk to our critical infrastructure.
☆72Updated 5 months ago
Alternatives and similar repositories for join-cisagov:
Users that are interested in join-cisagov are comparing it to the libraries listed below
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆74Updated 3 weeks ago
- President's Cup Cybersecurity Competition Challenges☆167Updated last month
- A site for CISA directives☆162Updated 10 months ago
- A set of guidelines and best practices for an awesome engineering team☆231Updated 2 weeks ago
- Search a filesystem for indicators of compromise (IoC).☆71Updated 2 months ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated this week
- CISA CSAF Security Advisories☆68Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆150Updated this week
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- A virtual appliance for building cyber labs, challenges and competitions☆25Updated this week
- SCuBA Secure Configuration Baselines and assessment tool for Google Workspace☆218Updated this week
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆350Updated last week
- CrowdStrike's Open Source Policy & Contribution Guide☆39Updated 3 weeks ago
- This repository contains the source code for the REMnux installer, which is the command-line tool for installing and upgrading the REMnux…☆45Updated 5 months ago
- pcaps of traffic for traffic analysis workshop☆84Updated 3 years ago
- ☆51Updated 2 years ago
- OT security monitoring #nsacyber☆593Updated last year
- The Infosec Community Definitive Guide to Jupyter Notebooks☆121Updated 4 years ago
- Exploit Prediction Scoring System (EPSS)☆25Updated 2 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆46Updated this week
- ☆58Updated 3 years ago
- CISA's catalog of bad practices that are exceptionally risky.☆206Updated 2 weeks ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated 2 weeks ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆114Updated 6 months ago
- Guidance for blocking outdated web technologies. #nsacyber☆57Updated 3 years ago
- A collection of intelligence about Log4Shell and its exploitation activity.☆183Updated 3 years ago
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆60Updated 3 months ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆96Updated 9 months ago
- Contains aggregated lists and information on cybersecurity topics☆38Updated last month
- InsightVM helpful SQL queries☆64Updated 2 months ago