communitysec / sbom-hall-of-fameView external linksLinks
A place for the InfoSec community to share and celebrate real stories of organizations successfully using SBOMs (and other bills of material) to actually manage and reduce security risk in meaningful ways
☆43Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for sbom-hall-of-fame
Users that are interested in sbom-hall-of-fame are comparing it to the libraries listed below
Sorting:
- Tools for preservation of floppy disks☆11Nov 22, 2025Updated 2 months ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- ☆12Feb 24, 2023Updated 2 years ago
- ☆11Dec 22, 2020Updated 5 years ago
- Stakeholder-Specific Vulnerability Categorization☆173Updated this week
- An analysis of the user password hashing algorithm used by Citrix NetScaler☆15Sep 23, 2025Updated 4 months ago
- ☆12Dec 23, 2021Updated 4 years ago
- CISOinaBox is a free community framework to organize tools, templates, and resources to help equip new CISOs and set them up for success.…☆31Dec 30, 2025Updated last month
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 2 years ago
- 🚧 Currently transfering TLP:CLEAR rules from TLP:AMBER repository...☆21Mar 22, 2024Updated last year
- Scanner for Zyxel products which are potentially vulnerable due to an undocumented user account (CVE-2020-29583)☆16Jan 4, 2021Updated 5 years ago
- ☆20Jul 16, 2025Updated 7 months ago
- Recon tool to query cloud prefixes for services associated with an IP address☆23Oct 2, 2024Updated last year
- This GitHub repository contains lessons for developing Microsoft Security CoPilot plugins☆19May 15, 2024Updated last year
- ☆49Updated this week
- Share your Yara rules with VirusTotal☆27Aug 12, 2024Updated last year
- Repository for scripts and tips for "Yara Scan Service"☆20Feb 19, 2023Updated 2 years ago
- Top hashpwn rules☆21Dec 12, 2025Updated 2 months ago
- This aims to be a collection of tools to forensically analyze Active Directory databases☆26Jun 11, 2025Updated 8 months ago
- ☆22Dec 22, 2020Updated 5 years ago
- Continuous Audit Metrics☆27Jun 5, 2024Updated last year
- Protect against subdomain takeover☆95Jul 20, 2025Updated 6 months ago
- Rumble Network Discovery API☆17May 16, 2024Updated last year
- ☆25Jun 15, 2025Updated 8 months ago
- Exploit Prediction Scoring System (EPSS)☆31Jun 1, 2022Updated 3 years ago
- Yara rules☆22Mar 27, 2023Updated 2 years ago
- ☆23Jun 1, 2023Updated 2 years ago
- Unescape strings with escape sequences written out as literal characters.☆26Jan 19, 2026Updated 3 weeks ago
- Kubernetes Identity Management Lab☆24Nov 5, 2024Updated last year
- Task management for small-group organizers.☆18Jul 23, 2022Updated 3 years ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆117Feb 9, 2026Updated last week
- SBOM Search - Context aware search in SBOM repositories☆29Nov 24, 2025Updated 2 months ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- SecuritySnack data that doesn't fit into a single tweet.☆43Dec 22, 2025Updated last month
- ☆32Apr 1, 2025Updated 10 months ago
- Copy a Docker image between registries without a full Docker installation☆38Aug 29, 2018Updated 7 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32May 11, 2024Updated last year
- Offensive Research Guide to Help Defense Improve Detection☆32Jan 27, 2023Updated 3 years ago