☆19Apr 8, 2023Updated 2 years ago
Alternatives and similar repositories for iso27001-2022
Users that are interested in iso27001-2022 are comparing it to the libraries listed below
Sorting:
- This repository contains ISO/IEC 27001:2022 compliance documents for ABC-FinTech, a fictional FinTech company. These documents are design…☆13Nov 6, 2024Updated last year
- ☆19Jul 24, 2021Updated 4 years ago
- Overview of existing mappings from and to cyber security controls☆19Oct 30, 2023Updated 2 years ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆215Dec 18, 2025Updated 2 months ago
- A platform to automate and orchestrate security rules for governance, risk and compliance, and continuous assurance.☆37Feb 18, 2026Updated 2 weeks ago
- Firma Digital☆12May 8, 2015Updated 10 years ago
- Python scripts to audit and harden the 2014-2017 Microsoft SQL Server☆10Jun 5, 2020Updated 5 years ago
- ☆12Sep 10, 2022Updated 3 years ago
- An all-in-one WiFi pentesting tool designed to automate and simplify WiFi security auditing and attacks — phishing, SSID spam, DoS, and m…☆34Jun 24, 2025Updated 8 months ago
- This is a spamming tool, to get leads.☆11Dec 7, 2020Updated 5 years ago
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- A basic Android background service that connects to a remote server, executes commands, and returns encrypted output. Disguised as a syst…☆21Aug 2, 2025Updated 7 months ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Nov 24, 2020Updated 5 years ago
- Templtor is a bash script that will gather all the community Nuclei templates.☆30Dec 19, 2025Updated 2 months ago
- Una pequeña guia de seguridad para tu servidor linux.☆12Feb 4, 2022Updated 4 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- Unicode Security Toolkit☆21Feb 15, 2026Updated 2 weeks ago
- Puppet module that hardens Windows Server to DoD STIG compliance☆14Sep 11, 2019Updated 6 years ago
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- ATM security list☆12Aug 10, 2020Updated 5 years ago
- Automating Cyber Threat Intelligence Reporting with Natural Language Generation☆15Jan 24, 2024Updated 2 years ago
- Learn how to be a hacker☆11Aug 29, 2023Updated 2 years ago
- Agentic Pentesting MCP server that discovers, exploits, and reports web application vulnerabilities.☆34Feb 22, 2026Updated last week
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- ☆15May 22, 2021Updated 4 years ago
- Hacking the Wifi Spy Tank YD-211S☆12Nov 1, 2019Updated 6 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆55Mar 7, 2022Updated 3 years ago
- 攻防武器项目☆13Nov 3, 2022Updated 3 years ago
- Vue Composition API Demo☆12May 3, 2021Updated 4 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆14Jun 15, 2024Updated last year
- Useful commands for pentesting Linux and Windows systems☆14Jul 18, 2020Updated 5 years ago
- Application for logging HTTP and DNS Requests☆15May 14, 2021Updated 4 years ago
- joomla com_xcloner exploit [Mass Autoexploiting script coded with python]☆13Apr 29, 2019Updated 6 years ago
- 💾 Bash oneliners and terminal tricks☆22Nov 24, 2022Updated 3 years ago
- FAST SIMPLE SMOOTH CMS CHECKER Multi thread~☆13May 16, 2018Updated 7 years ago
- EventLogSilencer is a PowerShell script designed for disable Windows Event Logging☆18Oct 28, 2023Updated 2 years ago
- Python Automation☆13May 19, 2021Updated 4 years ago
- Multiple Shells of the same code with different extentions.☆15May 14, 2020Updated 5 years ago