Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for security threat
security
x
threat
x
138 search results found
Security Datasets
⭐
15
A collection of resources for security data
Prismacloud Workshops Labs
⭐
15
Nrd List Downloader
⭐
14
Shell Script to download NRD(Newly Registered Domain) list for free
Bigseclist
⭐
13
A large repository of links spanning all topics in information security.
Elastic Tip
⭐
13
Elastic TIP is a python tool which automates the process of aggregating Threat Intelligence and ingesting the intelligence into a common format into Elasticsearch with the main goal of being used by the Security solution.
Splunk Sunburst
⭐
12
Sunburst IOCs for Splunk Ingest
Public Research
⭐
12
Public repository for Red Canary Research
Privacy And Security
⭐
12
Cross specification concerns and suggestions for privacy and security for the immersive web (Feature lead: Mounir Lamouri)
Hoard
⭐
12
Historical Observations of Actionable Reputation Data
Heimdall Framework
⭐
12
USB threat evaluation framework for Linux
Interview_tips
⭐
12
Summary of Cyber Security interview questions I have been through, hope this helps
Threat Intelligence Machine Learning Approach To Ics Security
⭐
11
The growing network connectivity witnessed in Supervisory Control and Data Acquisition (SCADA) systems raises cyber security concerns for Industrial Control System (ICS) facilities. To sustain critical infrastructure objective principles such as confidentiality, integrity, and availability from security breaches or devastating cyberattacks, compelling, proactive, and continuous security monitoring is needed. In this study, we propose a process to build an intelligent backend and visual system to
Nodejs Security Center
⭐
11
This repository is deprecated. All of its content and history has been moved to googleapis/google-cloud-node.
Old_threatspec
⭐
11
ThreatSpec - Continuous threat modelling through code - https://threatspec.org
Awesome Sdlc
⭐
10
Collection of resources on building Secure Development Lifecycle
Stamus_for_splunk
⭐
10
The Stamus Networks App for Splunk allows Splunk Enterprise users to extract information and insights from both the Stamus Security Platform and open source Suricata sensors.
The Box
⭐
10
A tool box with 174 useful and common Linux tools for penetration testing and security audits.
References
⭐
10
Collection of reusable references
Waterline
⭐
9
Waterline Documentation
Security Monitoring And Notification
⭐
9
Security Monitoring and Notification
Getfeeds
⭐
9
Python malware intelligence feed
Saudi Cert Api
⭐
9
This repository has a tool and an API for Saudi CERT alerts. Its goal is to help improve online safety knowledge in Saudi Arabia. Using AWS Lambda, this project takes Saudi CERT's alerts, organizes them, and makes them easy to get through a public API.
Secdevguideline
⭐
9
Sdn_sensor
⭐
9
Matthew Hall's Open-Source Threat Intelligence Event Sensor
Amp
⭐
8
Cisco Advanced Malware Protection (AMP) scripts
Security
⭐
8
Awesome Threat Intelligence
⭐
8
Awesome-Threat-Intelligence
Helm Charts
⭐
8
Soluto's Helm Charts Repository
Securitylist
⭐
7
Great security list for fun and profit
Embed
⭐
7
Adapt practically persistence steadiness strategies working at Windows 10 utilized by sponsored nation-state threat actors, as Turla, ProjectSauron, APT29, EquationGroup, including Stuxnet / Flame.
Appsec Designer Rule Sets For Threat Countermeasures And Security Functional Requirements
⭐
7
The most overtly detailed security blueprint you will ever need. Develop rule sets for use by Neo4j, AppSec Designer (TM), and any other tool choosing to use them, to define threat countermeasures and their related security functional component requirements.
Lp_threatmodeling
⭐
7
A threat modeling methodology created during my 2018 summer internship
Neanet
⭐
6
Threat intelligence
Jitsi Meet Secure Server
⭐
6
Automatically secure a private Jitsi-Meet server for videoconferencing. For those who do not have experience securing a webserver, so you are not an easy target. Has threat model and security evaluation. Pen Testers welcome.
Android Security Examples
⭐
6
Opsec
⭐
6
Operational Security for everyone
Research Notes
⭐
6
Ictm
⭐
6
A user-first approach to threat modeling.
Ai Cyber Security
⭐
5
Informationsecurity
⭐
5
App security is one of my key aspect of any application. In last few years my focus on security is gone up. Tons of learning and exciting experiments.
Ndr
⭐
5
Network Data Recorder
Cissp Notes
⭐
5
Certified Information Systems Security Professional (CISSP) notes
Graylog Alphasoc
⭐
5
A content pack to render AlphaSOC alerts within Graylog
Infosec Resources
⭐
5
Related Searches
Security Vulnerabilities (12,295)
Laravel Security (11,580)
Php Security (10,653)
Python Security (3,208)
Javascript Security (2,859)
Java Security (2,469)
Html Security (2,284)
Golang Security (1,306)
Shell Security (1,145)
Security Penetration Testing (920)
101-138 of 138 search results
< Previous
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.