Tablero de Control #SGSI #ISO27001
☆11Sep 22, 2021Updated 4 years ago
Alternatives and similar repositories for Controls
Users that are interested in Controls are comparing it to the libraries listed below
Sorting:
- Documentos elaborados en la Coordinación de Proyectos e Investigaciones de Ciberseguridad☆10Apr 25, 2018Updated 7 years ago
- ☆26Jan 16, 2026Updated last month
- A way to use XInput to insert PIN for login, useful for handheld devices that does not have Fingerprint or face reco☆12Nov 3, 2024Updated last year
- Technical Tabletop Exercises Simulation Framework☆48Oct 30, 2023Updated 2 years ago
- Kong API Manager with Prometheus And Graylog☆91Apr 13, 2025Updated 10 months ago
- Go Programming Language Workshop - Source Code☆10Jun 22, 2023Updated 2 years ago
- ☆12Feb 25, 2026Updated last week
- ☆12Sep 10, 2022Updated 3 years ago
- Repository for IT Audit and Controls Course (IS 369)☆15Feb 23, 2022Updated 4 years ago
- A pytorch image classifier for the recognising letters from the notMNIST dataset☆11Jan 4, 2019Updated 7 years ago
- Develop i2 Connect connectors in Java and Python to bring data into i2 Analyze.☆11Nov 10, 2025Updated 3 months ago
- ☆10Mar 9, 2021Updated 4 years ago
- GSSOC-20 Extended- Based on Topic Modeling, Classification, Natural Language Processing☆12Nov 22, 2020Updated 5 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- A specification to write software documentation compatible with GAMP 5☆14Nov 6, 2023Updated 2 years ago
- Read and write mha files using Python☆10Oct 14, 2013Updated 12 years ago
- This is the official repository for the CarPi project.☆10Jul 16, 2019Updated 6 years ago
- Collection of all the PHPCS rulesets offered by the PHPCompatibility organisation.☆13Feb 5, 2026Updated 3 weeks ago
- Automatic tool to find arbitrary Intent that gets reflected back vulnerabilities on Android apps.☆12Nov 15, 2022Updated 3 years ago
- Documentación sobre sistemas embebidos☆12Nov 15, 2024Updated last year
- Control Frame Attack Vulnerability Detection Tool (GitLab Mirror)☆12Dec 2, 2024Updated last year
- Scripts for OWASP-ZAP☆13Oct 7, 2025Updated 4 months ago
- ☆11Feb 6, 2017Updated 9 years ago
- ☆14Sep 28, 2023Updated 2 years ago
- a Python client to query the FIRST EPSS API☆11Sep 13, 2023Updated 2 years ago
- Trying to apply deep learning to music analysis☆12May 26, 2017Updated 8 years ago
- .NET wrapper around LogonUserA to test creds☆12Jun 2, 2022Updated 3 years ago
- You can check below blog post on attacks related to azure storage.☆13Apr 8, 2021Updated 4 years ago
- Sobel is first order or gradient based edge operator for images and it is implemented using verilog.☆14Dec 16, 2020Updated 5 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- Proyecto educativo, que muestra cómo un sistema se conecta con la Red de Salud Digital, parte de la Estrategia de Salud Digital de la Rep…☆17Dec 8, 2022Updated 3 years ago
- A training course on Web Security, Exploit Development and Source Code Auditing from 2009.☆12Feb 15, 2022Updated 4 years ago
- Collection of Custom Views for the Microsoft Windows Event Viewer☆17Dec 5, 2022Updated 3 years ago
- Curso sobre qemu/kvm + libvirt + lxc☆12Mar 10, 2025Updated 11 months ago
- Material e instructivo para el Workshop de nerdearla 101 v2☆13Jul 27, 2022Updated 3 years ago
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆13Mar 10, 2021Updated 4 years ago
- Grupo de trabajo IPS☆14Sep 22, 2020Updated 5 years ago
- AWS Backup implementation in terraform☆13Feb 8, 2020Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Sep 22, 2021Updated 4 years ago