This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of best practices.
☆13Apr 21, 2026Updated last week
Alternatives and similar repositories for publications
Users that are interested in publications are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Latex CV template for software engineers☆12Jun 22, 2021Updated 4 years ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆13Oct 26, 2017Updated 8 years ago
- This repository documents my hands on experience and assignments during the Columbia University Cybersecurity Program. It includes home l…☆13Aug 10, 2023Updated 2 years ago
- Open source information security policies☆16Jan 25, 2021Updated 5 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- ☆10Jul 18, 2019Updated 6 years ago
- The AI Security Verification Standard (AISVS) focuses on providing developers, architects, and security professionals with a structured c…☆132Updated this week
- ☆13Mar 4, 2021Updated 5 years ago
- Listen to incoming webhooks from DNSimple, and publish them to a Slack channel or other messaging service.☆24Updated this week
- ☆20Updated this week
- A test case runner for Sigma rules☆14Aug 14, 2024Updated last year
- OWASP Certified Secure-Software Developer☆25Mar 30, 2026Updated 3 weeks ago
- UST Rankings provides a basic rankings for instructors at HKUST, based on their teaching performance.☆26Feb 24, 2026Updated 2 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆12May 17, 2024Updated last year
- Alerting engine (slack etc) for testssl.sh JSON result output files☆16Jul 10, 2019Updated 6 years ago
- Antiforensic actions to secure your device if it's physically stolen from you☆14Jan 22, 2023Updated 3 years ago
- 🏠 my dotfiles☆19Oct 18, 2024Updated last year
- CVE-2022-25636 exploit rewritten with pipe primitive☆20Apr 5, 2022Updated 4 years ago
- A database seeder for Meteor applications.☆16Oct 10, 2018Updated 7 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Srcery theme various web assets☆12May 3, 2025Updated 11 months ago
- Ruby Oracle Security Scanner☆16Jul 9, 2012Updated 13 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Extract Everything. Decompress entire folders filled with archives.☆24Apr 7, 2026Updated 3 weeks ago
- Continuously poll OSX wireless signal strength, noise, ping time, etc.☆29Nov 23, 2016Updated 9 years ago
- Models for authenticated key exchange in Tamarin☆12Oct 9, 2019Updated 6 years ago
- That is an AWS CDK custom construct based on Tony's amazing Prowler Security, Hardening, Best Practises Tool https://github.com/toniblyx/…☆24May 10, 2023Updated 2 years ago
- Cradlepoint ECM Command Line Interface☆11Mar 7, 2023Updated 3 years ago
- CVE-2022-0185 exploit rewritten with pipe primitive☆17Apr 5, 2022Updated 4 years ago
- RBAC in Kubernetes visualizer☆24Jun 11, 2019Updated 6 years ago
- A single MonoDevelop Addin that transforms a regular MonoDevelop into a version that is tightly integrated with Unity☆19Mar 18, 2016Updated 10 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Exploit script for the CFOR vulnerability using Github's GraphQL API☆28Aug 7, 2024Updated last year
- High-performance DNS forwarder with caching, client/domain-based routing, hot-reloadable rules from folder, Prometheus metrics, and Docke…☆35Jan 15, 2026Updated 3 months ago
- ☆16May 15, 2025Updated 11 months ago
- Small snippets and scripts which I use☆36Sep 17, 2020Updated 5 years ago
- Blender to Renderman Exporter☆15Sep 18, 2011Updated 14 years ago
- Security Operations Chef☆59Jan 18, 2026Updated 3 months ago
- Source files etc. for artwork provided with LMMS☆14Nov 10, 2025Updated 5 months ago