vibenas / Cybersecurity-Lithuania-MapLinks
Map of Cybersecurity Sector in Lithuania
☆20Updated 6 months ago
Alternatives and similar repositories for Cybersecurity-Lithuania-Map
Users that are interested in Cybersecurity-Lithuania-Map are comparing it to the libraries listed below
Sorting:
- OpenVAS Reporting: Convert OpenVAS XML report files to reports☆146Updated 11 months ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆187Updated 11 months ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 3 years ago
- Pwnspoof repository☆262Updated last year
- Volatile Artifact Collector collects a snapshot of volatile data from a system. It tells you what is happening on a system, and is of par…☆254Updated 7 months ago
- ☆120Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆290Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆158Updated 2 years ago
- Configurations to implement Wazuh☆11Updated 2 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- A library of Incident Response notebooks using Jupyter. We will show how you can leverage pre-defined notebook files to guide your incide…☆147Updated last year
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated last week
- A collection of companies that disclose adversary TTPs after they have been breached☆244Updated last year
- An ongoing list of virtual cybersecurity conferences.☆120Updated 4 years ago
- A powerful and user-friendly browser extension that streamlines investigations for security professionals.☆397Updated last month
- Russia / Ukraine 2022 conflict related IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆175Updated 2 years ago
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.☆253Updated 7 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆282Updated this week
- DevSecOpsGuides☆187Updated 2 months ago
- Add a layer of active defense to your cloud applications.☆92Updated last week
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆237Updated last month
- MITRE Caldera™ for OT Plugins & Capabilities☆214Updated 7 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆279Updated last year
- Awesome Incident Response☆273Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆397Updated 7 months ago
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- Traps web spiders☆75Updated 5 years ago
- The IoT Security Testing Guide (ISTG) provides a comprehensive methodology for penetration tests in the IoT field, offering flexibility t…☆102Updated 9 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year