Vendor Security Model Contract
☆97Jul 3, 2022Updated 3 years ago
Alternatives and similar repositories for vsmc
Users that are interested in vsmc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VSAQ is an interactive questionnaire application to assess the security programs of third parties.☆860Jan 11, 2021Updated 5 years ago
- ⚖Open Source Toolkit for Conducting Quantitative Risk Assessment Interviews☆39Mar 10, 2024Updated 2 years ago
- ☆17Mar 2, 2023Updated 3 years ago
- ☆20Jan 18, 2022Updated 4 years ago
- This repository is a curated list of pro bono incident response entities.☆21Jun 21, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Baseline organizational policies and practices☆10Apr 17, 2017Updated 8 years ago
- OWASP Cloud Security - Enabling conversations through threat and control stories☆182Dec 7, 2018Updated 7 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆10Apr 3, 2022Updated 4 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- Network Defender Toolkit☆18Jun 11, 2013Updated 12 years ago
- Query 'GreyNoise Intelligence 'API' in R☆14Mar 5, 2020Updated 6 years ago
- ☆18Jul 30, 2024Updated last year
- A place to gather and organize information about using threat modeling frameworks to deal with social conflict in online systems☆57Jun 19, 2025Updated 9 months ago
- Compares and analyzes GCP IAM roles.☆79Mar 9, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated last month
- Economics of Ransomware | Dataset☆15May 2, 2018Updated 7 years ago
- NVD API 2.0 client for CVE information☆13May 15, 2025Updated 10 months ago
- Security, Compliance and Informational Dashboard System☆25May 12, 2021Updated 4 years ago
- 🔀 Tools to Organize and Visualize Tweets Including Tweet Threads (WIP)☆10Apr 25, 2018Updated 7 years ago
- Source for official CVE Program policy documents.☆18Jan 28, 2026Updated 2 months ago
- ☁️Haven GRC - easier governance, risk, and compliance 👨⚕️👮♀️🦸♀️🕵️♀️👩🔬☆105Jun 14, 2021Updated 4 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- Repository for the Open Information Security Risk Universe☆64Jul 10, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- A colour-coded radar chart to keep track of technologies in use, whether they are being evaluated, adopted or phased out.☆14Jan 6, 2021Updated 5 years ago
- General Data Protection Regulation as Tidy Object(s)☆10May 26, 2018Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Jun 26, 2020Updated 5 years ago
- Quantitative risk simulation tools☆20Aug 18, 2022Updated 3 years ago
- OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations☆14Mar 18, 2026Updated 3 weeks ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆78Dec 14, 2022Updated 3 years ago
- Precise Code Tracking (Vim)☆32Sep 9, 2016Updated 9 years ago
- PowerShell & Python: A side-by-side comparison☆27Aug 10, 2020Updated 5 years ago
- ⚖Open Source Toolkit for Quantitative Risk Assessment☆183Dec 21, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- OSSEM Modular☆27Jun 29, 2020Updated 5 years ago
- BLAKE3 Cryptographic Hash Function in R☆13Jan 13, 2020Updated 6 years ago
- Generate and Permutate Context Aware Dictionaries for Application Testing☆11Aug 16, 2016Updated 9 years ago
- ☆49Mar 21, 2023Updated 3 years ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- IP ASN History to find ASN announcing an IP and the closest prefix announcing it at a specific date☆97Jan 8, 2026Updated 3 months ago
- ☆69Jul 18, 2025Updated 8 months ago