Maturity Model Collaborative project
☆15Feb 27, 2023Updated 3 years ago
Alternatives and similar repositories for Vulnerability-management-maturity
Users that are interested in Vulnerability-management-maturity are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Burp Plugin for Contrast Security☆16Apr 21, 2026Updated 2 weeks ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- DEFCON-26 Workshop Lab Exercises☆12Aug 9, 2018Updated 7 years ago
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆22Dec 2, 2025Updated 5 months ago
- Node application to help managing Maturity Models like the ones created by BSIMM and OpenSAMM☆195Aug 27, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆18Dec 13, 2023Updated 2 years ago
- A Python script to discover AWS IAM identities (users and roles) with specified access to specified resources.☆14May 16, 2022Updated 3 years ago
- This repository contains DDOS scripts☆11Jan 17, 2020Updated 6 years ago
- ☆10Aug 11, 2025Updated 8 months ago
- Maintains backlink structure among interlinked Markdown notes☆11Dec 28, 2020Updated 5 years ago
- Every Security Engineer Interview Question From Glassdoor.com☆24Dec 17, 2017Updated 8 years ago
- ☆16Feb 10, 2025Updated last year
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated 2 months ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Nov 22, 2022Updated 3 years ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆48Jan 30, 2024Updated 2 years ago
- ☆24Aug 8, 2025Updated 8 months ago
- ☆16Updated this week
- ☆35May 13, 2021Updated 4 years ago
- Small tools to assist with using Large Language Models☆12Nov 7, 2023Updated 2 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- ☆25Oct 14, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Forked from Akayan. Windows Kernel Exploitation. Static & dynamic analysis, exploits & vuln reasearch. Mitigations bypass's, genric bug-c…☆16Oct 29, 2024Updated last year
- verinice.veo is a cloud-native application for managing information security and data protection☆23Apr 28, 2026Updated last week
- Outputs vs. outcomes: what's the different and why does it matter?☆16Apr 14, 2025Updated last year
- 🐻❄️ 🏹 Threat hunting with Polars and flaws.cloud AWS CloudTrail datasets.☆14May 22, 2024Updated last year
- An AI-powered plugin for Caldera that orchestrates long-running LLM workflows to automatically create adversary emulation abilities and p…☆27Mar 18, 2026Updated last month
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆45Jan 29, 2019Updated 7 years ago
- The CoSAI Risk Map is a framework for identifying, analyzing, and mitigating security risks in Artificial Intelligence systems. As tradit…☆78Updated this week
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Presentations☆10Oct 2, 2017Updated 8 years ago
- Script to mass deauthenticate multiple wireless clients.☆12Jan 1, 2017Updated 9 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- ☆14Jun 2, 2025Updated 11 months ago
- A client for Hashicorp Vault written in TypeScript☆14Nov 20, 2023Updated 2 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 15 years ago
- An MCP-capable intelligent Apple podcast transcription and summarization to markdown tool.☆29Feb 2, 2026Updated 3 months ago