Maturity Model Collaborative project
☆15Feb 27, 2023Updated 3 years ago
Alternatives and similar repositories for Vulnerability-management-maturity
Users that are interested in Vulnerability-management-maturity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Plugin for Contrast Security☆16Oct 8, 2025Updated 6 months ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆22Dec 2, 2025Updated 4 months ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- This repository contains DDOS scripts☆11Jan 17, 2020Updated 6 years ago
- ☆10Aug 11, 2025Updated 8 months ago
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- Every Security Engineer Interview Question From Glassdoor.com☆24Dec 17, 2017Updated 8 years ago
- ☆16Feb 10, 2025Updated last year
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Nov 22, 2022Updated 3 years ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆48Jan 30, 2024Updated 2 years ago
- ☆24Aug 8, 2025Updated 8 months ago
- ☆16Mar 29, 2026Updated 2 weeks ago
- ☆35May 13, 2021Updated 4 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆70Updated this week
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆25Oct 14, 2024Updated last year
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated last year
- verinice.veo is a cloud-native application for managing information security and data protection☆23Apr 8, 2026Updated last week
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆26Mar 18, 2026Updated 3 weeks ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆45Jan 29, 2019Updated 7 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- ☆14Jun 2, 2025Updated 10 months ago
- A client for Hashicorp Vault written in TypeScript☆14Nov 20, 2023Updated 2 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago