vibenas / Cybersecurity-Lithuania-MapLinks
Map of Cybersecurity Sector in Lithuania
☆25Updated last month
Alternatives and similar repositories for Cybersecurity-Lithuania-Map
Users that are interested in Cybersecurity-Lithuania-Map are comparing it to the libraries listed below
Sorting:
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆482Updated 7 months ago
- ☆432Updated 4 years ago
- BlueHound - pinpoint the security issues that actually matter☆760Updated 2 years ago
- This is a Project Designed for Security Analysts and all SOC audiences who wants to play with implementation and explore the Modern SOC a…☆720Updated last year
- The openSquat is an open-source tool for detecting domain look-alikes by searching for newly registered domains that might be impersonati…☆931Updated last month
- Everything related to Linux Forensics☆719Updated 2 years ago
- A query aggregator for OSINT based threat hunting☆930Updated 2 weeks ago
- A concise, directive, specific, flexible, and free incident response plan template☆751Updated last year
- Incident Response Methodologies 2022☆1,101Updated 10 months ago
- A collection of papers, blogs, and resources that make up the quintessential aspects of cyber threat intelligence☆703Updated 9 months ago
- AIL framework - Analysis Information Leak framework☆874Updated last week
- Awesome Incident Response☆284Updated 4 months ago
- Open Source Security Guide. Learn all about Security Standards (FIPS, CIS, FedRAMP, FISMA, etc.), Frameworks, Threat Models, Encryption, …☆1,049Updated 7 months ago
- A daily updated summary of the most frequent types of security advisories currently being reported from different sources.☆257Updated last year
- Simple command line tool to check for compliance against CIS Benchmarks☆271Updated last year
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,538Updated last year
- The SOC Analysts all-in-one CLI tool to automate and speed up workflow.☆1,455Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆684Updated last month
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆754Updated 2 years ago
- OCSF Documentation☆152Updated last week
- Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3☆532Updated 3 years ago
- Pwnspoof repository☆264Updated 2 years ago
- Map tracking ransomware, by OCD World Watch team☆483Updated 3 weeks ago
- A small collection of potentially useful contract templates