☆37Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for SecurityControlsFramework
Users that are interested in SecurityControlsFramework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆13Dec 29, 2020Updated 5 years ago
- NIST Cybersecurity Framework (CSF) Profile Assessment Tool - Track controls, assign ownership, document findings, score security states, …☆34Updated this week
- Tools to support cloud guardrails implementation and compliance checks for Microsoft Azure.☆27May 2, 2023Updated 3 years ago
- DefectDojo Community Content☆20Nov 9, 2025Updated 6 months ago
- Automation ☁️AWS Security 👮- Incident Response using Lambda⚡️to prevent credential exfiltration☆17Apr 9, 2021Updated 5 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- NIST CSF Maturity Toolkit☆120Jun 6, 2025Updated 11 months ago
- A Small Alternative to pi-hole, in python☆12Mar 13, 2022Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Dec 16, 2021Updated 4 years ago
- ☆35Oct 29, 2021Updated 4 years ago
- ☆76Jul 22, 2020Updated 5 years ago
- ☆14Mar 5, 2021Updated 5 years ago
- API Ubiquity UniFi Controller☆17Feb 18, 2021Updated 5 years ago
- A terraform module to deploy Minecraft Java edition on Azure☆10Jan 7, 2025Updated last year
- ☆11Apr 25, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Record the speed of cars passing in front of the Raspberry Pi Picamera☆13Nov 22, 2020Updated 5 years ago
- OWASP Foundation Threat Dragon Project Web Repository☆92May 3, 2026Updated 2 weeks ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22May 19, 2024Updated 2 years ago
- Tamil Dictionary☆23Jun 21, 2023Updated 2 years ago
- A Pi-hole equivalent for the Unifi Security Gateway☆31Dec 29, 2020Updated 5 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- TAXII 2.0 Server implemented in Node JS with MongoDB backend☆12Jan 3, 2023Updated 3 years ago
- Homepage for Portland State University's Electronics Prototyping Lab☆16Mar 2, 2024Updated 2 years ago
- ☆64Apr 12, 2026Updated last month
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆45Nov 30, 2022Updated 3 years ago
- ☆14Mar 28, 2020Updated 6 years ago
- Looks up details on a public IPV4 address against ip-info and blacklist-search sites. Providing a reputation check.☆11Oct 16, 2021Updated 4 years ago
- All my POC related to malware development☆15Feb 19, 2026Updated 3 months ago
- Documentation on the Cyber Defense Matrix☆27Apr 19, 2023Updated 3 years ago
- A developer-friendly framework for exhaustive analysis of (PCAP and PE) files.☆15Nov 6, 2017Updated 8 years ago
- An HTTP proxy library for Go☆16Jun 22, 2022Updated 3 years ago
- ☆12May 13, 2024Updated 2 years ago
- Collection of Group Policy Templates to accelerate implementing ACSC Essential 8☆51Feb 9, 2023Updated 3 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A simple low-interaction port monitoring honeypot.☆19Jun 14, 2020Updated 5 years ago
- Prototype system to monitor BGP routes and alert when anomalies are identified☆15Dec 7, 2018Updated 7 years ago
- Download a Bunch of Malware for Demos and Testing☆13Sep 28, 2018Updated 7 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆13Apr 18, 2020Updated 6 years ago
- ☆17Oct 26, 2021Updated 4 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- A script to test for subdomain takeovers from a list of domains☆12Feb 18, 2023Updated 3 years ago