Implementing ISO/IEC 27001:2022, by EC-Council
☆16Feb 20, 2026Updated last month
Alternatives and similar repositories for Implementing-ISO-IEC-27001-2022
Users that are interested in Implementing-ISO-IEC-27001-2022 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ISO 27001 related resources.☆25Updated this week
- ☆19Apr 8, 2023Updated 2 years ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆217Mar 10, 2026Updated 2 weeks ago
- ☆19Jul 24, 2021Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- This repo is for the Linkedin Learning course: Programming Foundations: Algorithms☆41Jan 11, 2024Updated 2 years ago
- Some set of scripts to unpack odin packets into separate files !!! Migrated to Codeberg !!!☆13Oct 9, 2023Updated 2 years ago
- Azure Cost Management Dashboard☆20May 11, 2023Updated 2 years ago
- ☆35Mar 8, 2022Updated 4 years ago
- WiP - cve-search next gen☆13Jan 18, 2020Updated 6 years ago
- Python for Security is the home of all open source Python projects that can integrate with Microsoft Technologies.☆12Jan 10, 2022Updated 4 years ago
- Leverage the Intel® Distribution of OpenVINO™ Toolkit to fast-track development of high-performance computer vision and deep learning inf…☆10Jul 28, 2020Updated 5 years ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Removes duplicate entries from a file, resulting in only unique parameter combinations. Useful for parsing waybackurls and making recon m…☆11May 31, 2020Updated 5 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- ☆13Jul 4, 2024Updated last year
- Machine Learning-based tool for Cybersecurity Risk Assessment☆12Jul 18, 2021Updated 4 years ago
- PoC of the Hundred Finance March 2022 exploit☆10Nov 10, 2022Updated 3 years ago
- This script searches NVD's website for new CVES, alerting you by email or telegram. You can configure a list of products that interest yo…☆11Mar 21, 2021Updated 5 years ago
- RuleVis is a powerful analysis tool that transforms your Wazuh ruleset into a dynamic, interactive force-directed graph. It helps you vis…☆25Nov 12, 2025Updated 4 months ago
- Application scanning component of OWASP PurpleTeam☆15Feb 12, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Open-source, enterprise-grade threat modeling platform☆32Mar 21, 2026Updated last week
- ☆13Jul 12, 2025Updated 8 months ago
- Create LAMP Stack using terraform with AWS☆11Feb 15, 2023Updated 3 years ago
- AWS CIS Controls module for terraform☆11Nov 16, 2023Updated 2 years ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- ☆17Jan 17, 2025Updated last year
- ☆19Nov 23, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Threat model for Azure Storage - Library of all the attack scenarios on Azure Storage, and how to mitigate them following a risk-based ap…☆59Mar 20, 2026Updated last week
- CIS benchmark quickplay for rapid assessments of the NGFW☆13Jul 27, 2023Updated 2 years ago
- Description here☆12Aug 17, 2022Updated 3 years ago
- No more need to struggle to manually get, move and import the csv-file from another device. All you need to do is run the tool (Shift+F10…☆20Jul 5, 2023Updated 2 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆13May 29, 2018Updated 7 years ago
- A pipeline for ingesting Jumpcloud directory events into Wazuh☆18May 8, 2024Updated last year
- AWS Cloudformation template for MongoDB cluster with replicas set and Automatic Scale, support Spot Instance.☆15Jul 9, 2025Updated 8 months ago