magoo / forecast-documentationLinks
Notes and reference for ongoing forecasting.
☆16Updated 3 years ago
Alternatives and similar repositories for forecast-documentation
Users that are interested in forecast-documentation are comparing it to the libraries listed below
Sorting:
- ☆16Updated 9 years ago
- Does your library check TLS certificates properly?☆79Updated 2 years ago
- Privacy Cards for Software Developers☆54Updated 6 years ago
- first commit☆20Updated 4 months ago
- Documents pertaining to internal policies and guidelines☆12Updated 9 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Legal, procedural and policies document templates for operating an IRT☆65Updated last year
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- An attack tree generator built on electron☆62Updated 9 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Vendor Security Model Contract☆97Updated 3 years ago
- NIST/NCCoE Mobile Threat Catalogue☆150Updated 5 months ago
- Using osquery for Mass Incident Detection & Response☆19Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- This is where we work on the newsletter☆28Updated 8 years ago
- Repo for MIRR Workshop Heroku app☆52Updated 5 years ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Updated 5 years ago
- Homographs: brutefind homographs within a font☆19Updated 8 years ago
- X.509 certificate linter☆158Updated 5 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- ☆198Updated 9 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- Certificate Transparency Log aggregation, parsing, and streaming service☆105Updated 7 years ago
- Internet data processing tools☆54Updated 5 years ago
- DEPRECATED USE v3!☆59Updated 10 years ago
- Jump to Full Encryption☆61Updated 9 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆60Updated 5 years ago
- a grep -r for secrets☆179Updated 3 years ago
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated 2 months ago