This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of best practices.
☆11Apr 6, 2023Updated 2 years ago
Alternatives and similar repositories for publications
Users that are interested in publications are comparing it to the libraries listed below
Sorting:
- A Latex CV template for software engineers☆12Jun 22, 2021Updated 4 years ago
- This repository documents my hands on experience and assignments during the Columbia University Cybersecurity Program. It includes home l…☆12Aug 10, 2023Updated 2 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆13Oct 26, 2017Updated 8 years ago
- The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured c…☆88Updated this week
- Open source information security policies☆16Jan 25, 2021Updated 5 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 2 years ago
- ☆10Jul 18, 2019Updated 6 years ago
- ☆13Mar 4, 2021Updated 5 years ago
- Terraform modules for CloudSploit Scanner☆14Jul 12, 2022Updated 3 years ago
- OWASP Certified Secure-Software Developer☆23Updated this week
- Listen to incoming webhooks from DNSimple, and publish them to a Slack channel or other messaging service.☆24Mar 10, 2026Updated last week
- ☆19Updated this week
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- UST Rankings provides a basic rankings for instructors at HKUST, based on their teaching performance.☆24Feb 24, 2026Updated 3 weeks ago
- ☆12May 17, 2024Updated last year
- Alerting engine (slack etc) for testssl.sh JSON result output files☆16Jul 10, 2019Updated 6 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- 🏠 my dotfiles☆18Oct 18, 2024Updated last year
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 3 years ago
- A database seeder for Meteor applications.☆16Oct 10, 2018Updated 7 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Srcery theme various web assets☆12May 3, 2025Updated 10 months ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Extract Everything. Decompress entire folders filled with archives.☆24Mar 10, 2026Updated last week
- Continuously poll OSX wireless signal strength, noise, ping time, etc.☆29Nov 23, 2016Updated 9 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- That is an AWS CDK custom construct based on Tony's amazing Prowler Security, Hardening, Best Practises Tool https://github.com/toniblyx/…☆24May 10, 2023Updated 2 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 3 years ago
- RBAC in Kubernetes visualizer☆24Jun 11, 2019Updated 6 years ago
- A single MonoDevelop Addin that transforms a regular MonoDevelop into a version that is tightly integrated with Unity☆19Mar 18, 2016Updated 10 years ago
- Small snippets and scripts which I use☆35Sep 17, 2020Updated 5 years ago
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆23Aug 7, 2024Updated last year
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 7 years ago
- High-performance DNS forwarder with caching, client/domain-based routing, hot-reloadable rules from folder, Prometheus metrics, and Docke…☆35Jan 15, 2026Updated 2 months ago
- ☆16May 15, 2025Updated 10 months ago
- Blender to Renderman Exporter☆15Sep 18, 2011Updated 14 years ago
- Security Operations Chef☆58Jan 18, 2026Updated 2 months ago