GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to manage technology risks.
☆27Mar 8, 2023Updated 2 years ago
Alternatives and similar repositories for grc
Users that are interested in grc are comparing it to the libraries listed below
Sorting:
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆34Jul 10, 2017Updated 8 years ago
- Automate the build of a vulnerable AD environment.☆40Aug 19, 2022Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆43Jul 13, 2023Updated 2 years ago
- Vulnerable FastAPI in reference to Opensource Web Application Security Project (OWASP) TOP 10: 2021☆16Jan 3, 2022Updated 4 years ago
- Red Team Operations Framework☆24Jul 14, 2024Updated last year
- ☆20Sep 2, 2021Updated 4 years ago
- hyperGRC is a lightweight, in-browser tool for managing compliance-as-code repositories in OpenControl format.☆28Jan 19, 2022Updated 4 years ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- my own 2fa bypass methodolgy☆28Sep 22, 2023Updated 2 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- ☆30Sep 20, 2023Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Updated this week
- Mira - Risk Management Platform - Community Edition☆50Feb 11, 2024Updated 2 years ago
- Tools and blogs I use to perform GCP red teams☆137Jul 23, 2024Updated last year
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- This is CheatSheet which I used on PJPT exam to fully compromise Domain Controller by doing internal network penentration testing.☆81Aug 20, 2023Updated 2 years ago
- Vulnerability☆33Oct 31, 2025Updated 4 months ago
- A simple authentication web page with face recognition and face verification.☆31Nov 6, 2024Updated last year
- This repository contains 0 click exploits to some HackTheBox machines, I used it to study for OSWE☆41May 9, 2024Updated last year
- ☆12Sep 9, 2023Updated 2 years ago
- a mock CISSP exam test simulator using aggregated questions from online sources.☆32Jun 11, 2020Updated 5 years ago
- This is my portfolio site made in the hacking style. Start typing something to feel yourself a hacker. And don't forget to put a star on …☆34Jul 10, 2023Updated 2 years ago
- ☆42Mar 24, 2024Updated last year
- ☆13Aug 19, 2015Updated 10 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- Load AWS infrastructure into Neo4j Database for security and compliance analisys☆11Aug 12, 2022Updated 3 years ago
- Queries from the blog posts.☆15Oct 6, 2024Updated last year
- In addition to providing a solution to create and manage custom security controls and frameworks this repository provide an integration o…☆12Nov 14, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- The dataset was used as a support to attack obfuscations. It is the largest obfuscated dataset, with realistic and various binaries and f…☆19Jan 15, 2026Updated last month
- The Eureka Lab Series is designed for learners at all levels of experience and interest in security concepts and technologies.☆10Nov 30, 2025Updated 3 months ago
- ☆14May 14, 2022Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- ☆13Feb 20, 2026Updated last week
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆52Apr 18, 2023Updated 2 years ago
- ☆45Oct 19, 2021Updated 4 years ago