securitywithoutborders / organizationLinks
Documents pertaining to internal policies and guidelines
☆12Updated 8 years ago
Alternatives and similar repositories for organization
Users that are interested in organization are comparing it to the libraries listed below
Sorting:
- This is where we work on the newsletter☆28Updated 8 years ago
- The Suspicious Email Submitter is a discontinued browser extension (Chrome, Chromium, Firefox) for the easy submission of suspicious emai…☆15Updated 2 years ago
- Simple script for PGP encrypted newsletter☆26Updated 9 years ago
- Advices to look for malicious software on your devices☆17Updated 5 years ago
- Baseline organizational policies and practices☆10Updated 8 years ago
- Browser extension that uses intelligence to combat malicious websites by blocking them in real-time.☆60Updated 5 years ago
- SAFETAG is a curricula, a methodology, and a framework for security auditors working with advocacy groups.☆82Updated 3 weeks ago
- Collection of IOCs related to targeting of civil society☆190Updated 4 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 5 years ago
- The ContactDB project was initiated to cover the need for a tool to maintain contacts for CSIRT teams☆37Updated 3 years ago
- The Digital First Aid Kit has moved to Gitlab:☆110Updated 6 years ago
- This python scripts can calculate the WHOIS Similarity Distance between two given domains.☆29Updated 3 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- RAWRR is a multiplatform app that assists with note taking and report generation for security evaluations.☆18Updated 2 years ago
- CIRCL system forensic tools or a jumble of tools to support forensic☆41Updated 2 years ago
- Browser extension that complements the PhishDetect service☆24Updated 2 years ago
- Client API to query the Phishing Initiative service API☆24Updated last year
- A streamlined way to create STIX documents!☆32Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- Satellite: Measuring The Internet's Stars☆39Updated 5 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆34Updated 4 years ago
- Passive DNS server interface compliant to "Common Output Format"☆10Updated 9 years ago
- Extract information from MISP via the API☆16Updated 9 years ago
- Passive DNS Common Output Format☆37Updated last year
- threat-intelligence.eu website and repository of information about open standards, documents, methodologies and processes in threat intel…☆49Updated last month
- Flexible framework that allows automation to process cyber threat information and update endpoint defense tools.☆20Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- ☆16Updated 9 years ago
- Automatic attack detector and botnet classifier☆28Updated 8 years ago