GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to manage technology risks.
☆29Mar 8, 2023Updated 3 years ago
Alternatives and similar repositories for grc
Users that are interested in grc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Sharpen your data science and cybersecurity skills by doing a project with open datasets☆11Jun 9, 2020Updated 5 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆20Jun 30, 2023Updated 2 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Automate the build of a vulnerable AD environment.☆41Aug 19, 2022Updated 3 years ago
- Red Team Operations Framework☆23Jul 14, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- REST API testing tool for CLI, GitHub Actions, and Prometheus☆11Nov 7, 2019Updated 6 years ago
- This project is a tool for detecting nudity in images, allowing users to analyze both local images and images from URLs. It utilizes the …☆22Sep 28, 2024Updated last year
- ☆20Oct 18, 2022Updated 3 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆44Jul 13, 2023Updated 2 years ago
- The DNS Security Analysis Tool is a Python-based utility designed to conduct an in-depth security analysis of DNS configurations for mult…☆19Oct 18, 2024Updated last year
- List of awesome projects around the TI-Nspire calculators☆18May 1, 2023Updated 2 years ago
- This repository contains ISO/IEC 27001:2022 compliance documents for ABC-FinTech, a fictional FinTech company. These documents are design…☆14Nov 6, 2024Updated last year
- Builds a resume from your LinkedIn profile using JasperSoft's tools☆23Jul 7, 2022Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Aug 3, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆20Sep 2, 2021Updated 4 years ago
- Multithread reverse shell listener☆26Feb 10, 2024Updated 2 years ago
- Scrap Linkedin Jobs, and create resumes with custom skills for each job description☆23Jan 29, 2021Updated 5 years ago
- Key risk indicator (KRI) for risk management and business strategy☆30Apr 14, 2025Updated last year
- Export desired amount of posts from specified subreddit and category/sort without any API wrappers☆24Aug 7, 2023Updated 2 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆12Oct 6, 2020Updated 5 years ago
- Git visualisation software written in Lua.☆17Aug 31, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago
- Simple, High Quality, Open Source RAG solution for chatting with your documents☆28Dec 12, 2024Updated last year
- bash script for automating subdomain enumeration process either passive or active☆30Feb 24, 2026Updated 2 months ago
- Vulnmine searches for vulnerable hosts using MS SCCM host / software inventory data with NIST NVD Vulnerability feed data.☆38Jul 6, 2023Updated 2 years ago
- PhishX - The Complete Spear Phishing Tool☆110Sep 13, 2018Updated 7 years ago
- Implementation of ANSI E1.31 (sACN)☆38Feb 12, 2026Updated 2 months ago
- Tools and blogs I use to perform GCP red teams☆142Jul 23, 2024Updated last year
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Mar 2, 2022Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Just-In-time Active Directory solution☆33Sep 3, 2025Updated 7 months ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- ☆12Nov 22, 2024Updated last year
- Shellcode Loader | xss.is☆13Jul 26, 2024Updated last year
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Microsoft Azure Security Engineer Associate (AZ-500) Study Notes☆30Jun 13, 2023Updated 2 years ago
- Automatic cloud backup of Kali Linux data☆13Feb 27, 2020Updated 6 years ago