Questions to ask about the team and company when you're interviewing for a CISO position
☆15Oct 19, 2021Updated 4 years ago
Alternatives and similar repositories for ciso-interview-questions
Users that are interested in ciso-interview-questions are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source information security policies☆16Jan 25, 2021Updated 5 years ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- ☆17Jan 8, 2026Updated 2 months ago
- MacOS frontend for SANE☆12Aug 25, 2023Updated 2 years ago
- ☆15Oct 6, 2024Updated last year
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Updated this week
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- Build security program documentation using Git and Markdown☆28Jan 26, 2026Updated 2 months ago
- Archive of the Information Secuity policy documentation for Greater Manchester CHC that conforms to ISO27001☆14Apr 19, 2020Updated 5 years ago
- Security Monitoring Resolution Categories☆137Nov 25, 2021Updated 4 years ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 4 months ago
- ☆13Mar 29, 2021Updated 4 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- Easy to use GuardDuty alerting with the help of Terraform and Slack☆19Apr 3, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆19Apr 8, 2023Updated 2 years ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 7 years ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆264Jul 5, 2025Updated 8 months ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆36Jul 10, 2017Updated 8 years ago
- A site comparing services of different Cloud Vendors☆10Jan 4, 2017Updated 9 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Jun 11, 2011Updated 14 years ago
- Fork from @rsmudge/armitage☆34Dec 6, 2022Updated 3 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Learning material for completely newcomers in the field of BOFs☆15Apr 11, 2020Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Aug 31, 2016Updated 9 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- ☆32Mar 19, 2026Updated last week
- This project will work towards a fully-functional autonomous intelligent cyberdefense agent with increasingly advanced capabilities that …☆43Jan 20, 2025Updated last year
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- active directory ssh pam integration for Azure AD☆11Jan 29, 2017Updated 9 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- ☆17Sep 20, 2018Updated 7 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- Install macOS Monterey on MacBook Pro exclude by Apple on Monterey 12☆37Jan 28, 2024Updated 2 years ago
- ☆18Feb 13, 2026Updated last month
- ☆12Apr 3, 2014Updated 11 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 5 months ago
- Syntax highlighting for Bats - Bash Automated Testing System☆21Jul 3, 2013Updated 12 years ago
- Principles of "Retire at 35"☆31Jun 8, 2023Updated 2 years ago