This GitHub page shows the CISO Tradecraft Podcast broken down by Topic
☆145Jan 2, 2026Updated 3 months ago
Alternatives and similar repositories for Podcast
Users that are interested in Podcast are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Oct 7, 2025Updated 6 months ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- Windows Event Log "Microsoft-Windows-Partition%4Diagnostic.evtx" parser and devices' VSNs extractor.☆20Nov 28, 2023Updated 2 years ago
- ☆22Jan 6, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆1,012Sep 7, 2025Updated 7 months ago
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- ☆20Aug 4, 2019Updated 6 years ago
- Factor Analysis of Information Risk (FAIR) tool developed in R☆22Mar 23, 2018Updated 8 years ago
- Helpful mnemonics for remembing concepts you may see in the CISSP exam☆52Jul 27, 2018Updated 7 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 3 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆36Apr 29, 2025Updated 11 months ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A very basic javascript generator for Girocode and Bezahlcode QR Codes that are used for bank transfers in Germany☆13Aug 23, 2025Updated 7 months ago
- A curated collection of tools, bots, and resources for Open Source Intelligence (OSINT) investigations on Telegram. Includes chat analysi…☆59Oct 5, 2025Updated 6 months ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated 2 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆111Jan 2, 2025Updated last year
- #100DaysOfCloud #100DaysOfCyberSecurity snippets starting from 28 SEPT 2022☆15Oct 17, 2022Updated 3 years ago
- NIST CyberSecurity Framework management tool☆167Nov 22, 2021Updated 4 years ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,039Dec 21, 2024Updated last year
- open all links in firefox while using chrome☆15Apr 8, 2026Updated last week
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ESPboy cellphone with GSM module based on SIM800 chip - ESP8266 privacy care hacker's phone☆10Oct 17, 2021Updated 4 years ago
- ☆15Aug 20, 2019Updated 6 years ago
- Links and guidance related to the return on mitigation report in the Microsoft Digital Defense Report☆28Oct 10, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated 2 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Detecting and Responding to Threats using Microsoft 365 Defender, published by Packt☆16Jul 10, 2023Updated 2 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- ☆19Mar 26, 2026Updated 3 weeks ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Mindmaps about AWS based on public information☆132Jun 14, 2022Updated 3 years ago
- This directory features proven systems that demonstrate value to your threat-informed efforts using metrics.☆114Nov 19, 2024Updated last year
- ☆1,054Apr 12, 2026Updated last week
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Conference presentations☆60Oct 22, 2025Updated 5 months ago
- Solution for Auditing LAPS usage in an Active Directory environment.☆36Dec 11, 2015Updated 10 years ago