Building a keylogger using Metasploit framework
-
Updated
Jun 14, 2024
Building a keylogger using Metasploit framework
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about Security Assurance in Cybersecurity
Github organisation security auditing tool
Micro-ID-Gym is a software suite designed to aid security researchers and developers in testing Identity Management protocols implementations
Modified Chef recipes for Windows Server hardening using chef-apply
A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.
Security Control Knowledge Graph
An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites, blog posts, links to github Repositories, technical guidelines and important resources about DevSecOps in Cybersecurity.
Building Operational Visibility Into (n) Environments
🤖 Admyral enables continuous control monitoring for any custom control
Identify hardcoded secrets in static structured text
Ansible role to apply a security baseline. Systemd edition.
Hardening Ubuntu. Systemd edition.
Add a description, image, and links to the security-compliance topic page so that developers can more easily learn about it.
To associate your repository with the security-compliance topic, visit your repo's landing page and select "manage topics."