A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of material) to actually manage and reduce security risk in meaningful ways
☆43Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for sbom-hall-of-fame
Users that are interested in sbom-hall-of-fame are comparing it to the libraries listed below
Sorting:
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- ☆12Feb 24, 2023Updated 3 years ago
- Script for applied security baseline controls in RedHat/CentOS.☆12Jun 30, 2025Updated 8 months ago
- Tools for preservation of floppy disks☆15Nov 22, 2025Updated 3 months ago
- ☆11Dec 22, 2020Updated 5 years ago
- ☆12Dec 23, 2021Updated 4 years ago
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- ☆20Jul 16, 2025Updated 7 months ago
- ☆50Updated this week
- Top hashpwn rules☆20Dec 12, 2025Updated 2 months ago
- Share your Yara rules with VirusTotal☆28Aug 12, 2024Updated last year
- ☆22Dec 22, 2020Updated 5 years ago
- Check if IP address is part of AWS infrastructure☆18Dec 2, 2020Updated 5 years ago
- Continuous Audit Metrics☆27Jun 5, 2024Updated last year
- Protect against subdomain takeover☆95Jul 20, 2025Updated 7 months ago
- Rumble Network Discovery API☆17May 16, 2024Updated last year
- Implement FIDO U2F in OpenSSH with SoloKeys☆22Mar 9, 2020Updated 6 years ago
- CIS Microsoft 365 Foundations Benchmark v5.0.0 - Automated Compliance Checker☆70Updated this week
- ☆25Jun 15, 2025Updated 8 months ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Security Rules & Workflows for the new wave of AI Development.☆45Aug 7, 2025Updated 7 months ago
- ☆23Jun 1, 2023Updated 2 years ago
- Unescape strings with escape sequences written out as literal characters.☆26Jan 19, 2026Updated last month
- SBOM Vulnerability Scanning & Assessment tool☆55Updated this week
- Kubernetes Identity Management Lab☆24Nov 5, 2024Updated last year
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆118Mar 3, 2026Updated last week
- SBOM Search - Context aware search in SBOM repositories☆29Nov 24, 2025Updated 3 months ago
- ☆29Jan 19, 2023Updated 3 years ago
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- ☆37Apr 9, 2025Updated 11 months ago
- ☆32Apr 1, 2025Updated 11 months ago
- SecuritySnack data that doesn't fit into a single tweet.☆45Feb 26, 2026Updated last week
- High performance search for IP addresses and CIDR ranges☆34Feb 4, 2026Updated last month