eugk / ciso-interview-questionsView external linksLinks
Questions to ask about the team and company when you're interviewing for a CISO position
☆15Oct 19, 2021Updated 4 years ago
Alternatives and similar repositories for ciso-interview-questions
Users that are interested in ciso-interview-questions are comparing it to the libraries listed below
Sorting:
- Open source information security policies☆16Jan 25, 2021Updated 5 years ago
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- ☆17Jan 8, 2026Updated last month
- ☆15Oct 6, 2024Updated last year
- ☆18Apr 27, 2025Updated 9 months ago
- Sample code snippets for consuming the CloudSploit API☆13Nov 10, 2023Updated 2 years ago
- active directory ssh pam integration for Azure AD☆11Jan 29, 2017Updated 9 years ago
- A collection of resources to learn Reverse Engineering and Binary Exploitation☆11Nov 11, 2020Updated 5 years ago
- ☆12Apr 3, 2014Updated 11 years ago
- Description here☆12Aug 17, 2022Updated 3 years ago
- A site comparing services of different Cloud Vendors☆10Jan 4, 2017Updated 9 years ago
- ☆13Mar 29, 2021Updated 4 years ago
- Fast asynchronous DNS Scanner/bruteforcer☆18Jun 11, 2011Updated 14 years ago
- MacOS frontend for SANE☆12Aug 25, 2023Updated 2 years ago
- Pritunl Zero Docker image☆18Nov 12, 2025Updated 3 months ago
- Web interface for monitoring and interacting with Netflow data stored in Silk repositories.☆13Mar 24, 2019Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 3 weeks ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Feb 6, 2026Updated last week
- Content and Instructions for completing the "Making Things Right with AWS Lambda and AWS Config Rules" Workshop.☆22Nov 27, 2017Updated 8 years ago
- Threat Hunting is time consuming enough as it is. Coming up with and tracking metrics to justify your hunt team to the Execs often takes…☆13Dec 7, 2022Updated 3 years ago
- A Ghidra extension that allows you to run Angr symbolic execution using the Pcode from Ghidra.☆16Nov 11, 2021Updated 4 years ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- SysCalling is an educational project demonstrating state-of-the-art syscall execution techniques for bypassing user-space EDR controls in…☆14Dec 8, 2024Updated last year
- Easy switch between AWS Profiles and Regions☆13Jul 21, 2022Updated 3 years ago
- Implement an event-based CI workflow on a CodeCommit repository☆12Jan 28, 2026Updated 2 weeks ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Aug 31, 2016Updated 9 years ago
- Learning material for completely newcomers in the field of BOFs☆14Apr 11, 2020Updated 5 years ago
- 42Crunch API Security Platform Samples and Tutorials☆12Jul 9, 2025Updated 7 months ago
- REciNK - Rethink Continuous Integration for JavaScript Applications☆14Jan 28, 2026Updated 2 weeks ago
- Dockerfiles for containerized osquery☆14May 23, 2017Updated 8 years ago
- Colorize Reached Blocks in IDA Pro using DynamoRIO drcov Output☆20Jun 15, 2023Updated 2 years ago
- Any code for preparing for OSCE☆12Oct 31, 2017Updated 8 years ago
- A small tool for creating and searching Golomb Compressed Sets☆13Jul 21, 2022Updated 3 years ago
- Monitors the network for new connected MAC addresses☆17Dec 10, 2022Updated 3 years ago
- 🎓Materials for the Hands-On Introduction to OpenFAIR Risk Analysis with Tidyrisk☆14Jan 22, 2021Updated 5 years ago
- defendA Data Lake. A firehose pipeline to athena providing enrichment and normalization for security events☆17Apr 19, 2023Updated 2 years ago
- Generative AI Governance for Enterprises☆16Dec 29, 2024Updated last year
- ☆36Feb 18, 2013Updated 12 years ago
- A Ghidra script to improve decompiled code readability by re-writing it (Using DeepSeek) in a better way, Along with renaming/assigning v…☆19Oct 8, 2025Updated 4 months ago