cisagov / join-cisagovLinks
CISA is hiring! We’re looking for candidates passionate about our mission to lead the national effort to understand and manage cyber and physical risk to our critical infrastructure.
☆75Updated last year
Alternatives and similar repositories for join-cisagov
Users that are interested in join-cisagov are comparing it to the libraries listed below
Sorting:
- A set of guidelines and best practices for an awesome engineering team☆258Updated this week
- Search a filesystem for indicators of compromise (IoC).☆81Updated last month
- A site for CISA directives☆167Updated last year
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 7 months ago
- CISA's catalog of bad practices that are exceptionally risky.☆211Updated this week
- ☆93Updated 2 weeks ago
- President's Cup Cybersecurity Competition Challenges☆186Updated 2 months ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆129Updated 5 years ago
- Logs key Windows process performance metrics. #nsacyber☆67Updated 2 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆75Updated 5 years ago
- CrowdStrike's Open Source Policy & Contribution Guide☆45Updated last month
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated last week
- ☆63Updated 4 years ago
- Guidance for blocking outdated web technologies. #nsacyber☆63Updated 3 years ago
- an awesome list of active defense resources☆126Updated 5 years ago
- public repo for github pages to display graphics☆106Updated 7 months ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆46Updated last month
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- Dashboard for conducting Backdoors and Breaches sessions over Zoom.☆117Updated last year
- Supporting files for the Chinese State-Sponsored Cyber Operations: Observed TTPs Cybersecurity Advisory. #nsacyber☆44Updated 4 years ago
- A command-line utility for generating random passwords, passphrases, and raw keys. #nsacyber☆143Updated last year
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆49Updated this week
- Passive service locator, a python sniffer that identifies servers, clients, names and much more☆256Updated 2 years ago
- Stand-Alone Windows Hardening (SAWH) is a script to reduce the attack surface of Windows systems that are not attached to a Windows Activ…☆55Updated 4 years ago
- Endpoint detection for remote hosts for consumption by RITA and Elasticsearch☆80Updated last month
- A cybersecurity game in Azure Data Explorer☆173Updated last year
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Resources, tools and utilities about Threat Intelligence☆74Updated 2 years ago
- Extracts fields from zeek logs, compatible with zeek-cut☆23Updated last year
- A curated list of Awesome Threat Intelligence resources☆50Updated 7 years ago