This GitHub page shows the CISO Tradecraft Podcast broken down by Topic
☆144Jan 2, 2026Updated 2 months ago
Alternatives and similar repositories for Podcast
Users that are interested in Podcast are comparing it to the libraries listed below
Sorting:
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆20Jan 24, 2021Updated 5 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Oct 7, 2025Updated 5 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆263Jul 5, 2025Updated 8 months ago
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- ☆16Feb 15, 2022Updated 4 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- AWS Quick Start Team☆16Oct 3, 2024Updated last year
- ☆13Nov 22, 2022Updated 3 years ago
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆19Feb 6, 2023Updated 3 years ago
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- A Java library for programmatically calculating OWASP Risk Rating scores☆19Apr 3, 2023Updated 2 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆985Sep 7, 2025Updated 6 months ago
- A passive online scanner from OWTF☆16Feb 16, 2026Updated 3 weeks ago
- open all links in firefox while using chrome☆14Sep 2, 2024Updated last year
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Feb 4, 2025Updated last year
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated last month
- A repository of resources discussing the Public Sectors push for Zero Trust along with associated resources for learning on the topic.☆42Mar 2, 2022Updated 4 years ago
- An Installation Script for Bro IDS on Debian Based Systems☆20Jun 25, 2020Updated 5 years ago
- ☆20Aug 4, 2019Updated 6 years ago
- ☆25Jun 27, 2024Updated last year
- Public repository of all things cloud security.☆47Sep 20, 2024Updated last year
- Helpful mnemonics for remembing concepts you may see in the CISSP exam☆52Jul 27, 2018Updated 7 years ago
- Everything Application Security☆27Mar 3, 2026Updated last week
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆38Feb 16, 2026Updated 3 weeks ago
- Open Threat Modeling Template☆52Jul 10, 2024Updated last year
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated last year
- A Burp Extension to test applications for vulnerability to the Web Cache Deception attack☆26Nov 23, 2017Updated 8 years ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆76Updated this week
- A comprehensive database of Model Context Protocol vulnerabilities, security research, and exploits☆34Feb 16, 2026Updated 3 weeks ago
- ☆1,050Aug 22, 2025Updated 6 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,034Dec 21, 2024Updated last year
- ☆43Aug 27, 2025Updated 6 months ago
- ☆25Mar 28, 2018Updated 7 years ago
- ☆10Sep 10, 2024Updated last year
- This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11…☆28Aug 19, 2020Updated 5 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago