☆37Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for SecurityControlsFramework
Users that are interested in SecurityControlsFramework are comparing it to the libraries listed below
Sorting:
- ☆21Feb 22, 2023Updated 3 years ago
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Apr 9, 2021Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- Raf Scanner IDE☆12Apr 14, 2023Updated 2 years ago
- ☆32Aug 11, 2023Updated 2 years ago
- ☆77Jul 22, 2020Updated 5 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- IAM modules and YML-based terraform configuration generator☆18Nov 5, 2025Updated 4 months ago
- Humio CloudWatch Ingestion Suite☆17Jun 20, 2025Updated 9 months ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- ☆35Feb 13, 2023Updated 3 years ago
- Cookiecutter template for new Ansible projects☆12Jul 14, 2017Updated 8 years ago
- Generates runbooks for GuardDuty findings☆38Jun 24, 2024Updated last year
- AWS SSO Reporter☆55May 7, 2025Updated 10 months ago
- Demo artifacts to go along with Kafka in Jail with Strimzi presentation☆13Jun 12, 2019Updated 6 years ago
- Record the speed of cars passing in front of the Raspberry Pi Picamera☆13Nov 22, 2020Updated 5 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆88Mar 15, 2026Updated last week
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- The Secure Coding Framework☆22Jun 19, 2020Updated 5 years ago
- ☆12Sep 27, 2020Updated 5 years ago
- ☆44Nov 30, 2022Updated 3 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- Collection of some KiCad Libraries we use at MTE☆16Dec 26, 2020Updated 5 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated last month
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- Documentation on the Cyber Defense Matrix☆25Apr 19, 2023Updated 2 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆50Feb 9, 2023Updated 3 years ago
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Its explained for a project and you can try the same for your requirement.☆18Jul 6, 2018Updated 7 years ago
- THOR APT Scanner User Manual☆20Mar 9, 2026Updated last week
- Collection of scripts/resources/ideas for attack surface reduction and additional logging to enable better threat hunting on Windows endp…☆38Apr 5, 2024Updated last year
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago