paulveillard / cybersecurity-vulnerability-managementLinks
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Software Vulnerabilities Management Process in Cybersecurity
☆12Updated 7 months ago
Alternatives and similar repositories for cybersecurity-vulnerability-management
Users that are interested in cybersecurity-vulnerability-management are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆18Updated last year
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆13Updated last year
- ☆16Updated 3 years ago
- An ongoing curated collection of awesome software, libraries, frameworks, talks & videos, best practices, learning tutorials and importan…☆15Updated 2 years ago
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated 2 weeks ago
- An ongoing & curated collection of awesome AuthN+Z software, libraries and frameworks, best guidelines and technical resources and cool s…☆17Updated last year
- 👽 The collection of awesome software, tools, libraries, documents, books, resources and cool stuff about information security, penetrati…☆26Updated this week
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about SSL / TLS☆22Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆53Updated 2 years ago
- Collection of scripts, files, and tips to create and maintain networks, hack, and more!☆73Updated 4 years ago
- ☆10Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated 3 years ago
- Kali Linux extra useful packages for CTF and Pentest activities☆11Updated 2 weeks ago
- HalilDeniz☆8Updated 10 months ago
- A self-assessment tool by @NC3-LU to help business owners implement a better cybersecurity strategy.☆24Updated 2 months ago
- A PoC backdoor that uses Gmail as a C&C server☆14Updated 5 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Updated 4 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 5 months ago
- DefectDojo Community Content☆18Updated last month
- Open-source powered SIEM, Vulnerability Scanning, Host- & Network-IDS. Built upon Elastic Stack, OpenVAS, Suricata. Wrapped in a Python F…☆15Updated 2 years ago
- MITRE ATT&CK Based App in Power BI☆16Updated last year
- Computer Network Exploitation (CNE) Field Manual☆13Updated last year
- Source for NIST cybersecurity documents during government shutdown☆17Updated 6 years ago
- Adding PowerShell scripts that I use on my Proxmox server to automate certain tasks.☆11Updated 2 years ago
- CyHy Dashboard☆17Updated this week
- Documentation of vmc☆16Updated 4 months ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆11Updated 3 months ago
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆16Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- A collection of awesome security hardening software, libraries, learning tutorials & documents, e-books, best practices, checklists, benc…☆35Updated 3 years ago