read the docs version of risk management
☆27Mar 6, 2023Updated 3 years ago
Alternatives and similar repositories for risk-measurement
Users that are interested in risk-measurement are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notes and reference for ongoing forecasting.☆16Mar 24, 2022Updated 4 years ago
- A minimalist risk management program!☆152Aug 10, 2022Updated 3 years ago
- Threat Mitigation Strategies☆29Feb 18, 2026Updated 2 months ago
- Strip email message body from quotes and signatures☆26Aug 21, 2012Updated 13 years ago
- ☆44Apr 20, 2026Updated 2 weeks ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 11 months ago
- STIX 2 Fake Data Generator☆11Oct 17, 2024Updated last year
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- You can model your distributed infrastructure and application, simulate its behavior and observe its efficiency easily.☆14Jul 16, 2019Updated 6 years ago
- Rapid prototyping HTTP toolkit based on Netty. Supports container-style jars, multi-hosting, REST primitives.☆19Jul 14, 2013Updated 12 years ago
- Scripts for importing threat feeds and CTI articles, blogs, and reports into MISP.☆18Jun 16, 2025Updated 10 months ago
- A desktop App to add STIX-2 objects to TAXII-2.0 servers☆11Mar 13, 2019Updated 7 years ago
- ☆13Mar 23, 2021Updated 5 years ago
- SecTor - Not-So-Secret Agents: Deploying AI to Optimize Security Operations☆39Oct 15, 2025Updated 6 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- VPS infrastructure found in HT dumps☆26Jul 10, 2015Updated 10 years ago
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆41Apr 9, 2026Updated last month
- ☆46May 12, 2025Updated 11 months ago
- List of OSINT Capture The Flag platforms☆56Mar 27, 2026Updated last month
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- ☆11Oct 13, 2020Updated 5 years ago
- A set of Bash scripts that allows you to repeatably collect and compare baseline audit data from Linux and Windows systems☆20Oct 19, 2013Updated 12 years ago
- Admin Submission API allows submission of URLs, mail messages, file mail messages and files to Microsoft to re-scan and get newest verdic…☆10Aug 6, 2021Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆17Aug 2, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An API Design System is a collection of curated standards, guidelines, practices, and principles aimed at helping teams build consistent,…☆11Apr 27, 2022Updated 4 years ago
- MODBUS Penetration Testing Framework☆11Mar 27, 2019Updated 7 years ago
- Linkedin Tools (and maybe later other source) to reconstruct a company hierarchy from scraping relations and jobs title☆17Aug 4, 2020Updated 5 years ago
- A site focussed on connecting and empowering people who share transport problems of different kinds.☆37Jul 22, 2015Updated 10 years ago
- The project will serve as a central repository for VMware Threat Analysis Unit (TAU) to share threat intelligence with the security commu…☆17Mar 25, 2023Updated 3 years ago
- The Magento SecurityBundle provides additional security features for your e-commerce application.☆16Mar 12, 2014Updated 12 years ago
- Python System Administration, Export list item, Sharepoint list, AD attributes, Active directory, sftp, sftp upload☆12Jul 26, 2023Updated 2 years ago
- Covert.io blog☆12Feb 3, 2024Updated 2 years ago
- Compliance Scorecard OSCAL Policy Standards☆26May 6, 2024Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- AWS Quick Start Team☆16Oct 3, 2024Updated last year
- Collection of information security policies.☆29Apr 20, 2017Updated 9 years ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆69Nov 27, 2025Updated 5 months ago
- Docker Compose based system for running remote browsers (including Flash and Java support) connected to web archives☆16Jun 10, 2021Updated 4 years ago
- A telegram bot to create orders on FTX☆12Apr 30, 2026Updated last week
- Go-language library to check for problematic Unicode code points☆30Sep 15, 2025Updated 7 months ago
- Open source information security policies☆16Jan 25, 2021Updated 5 years ago