MITRE ATT&CK Based App in Power BI
☆18Feb 23, 2024Updated 2 years ago
Alternatives and similar repositories for MITRE_ATTACK_PowerBI_
Users that are interested in MITRE_ATTACK_PowerBI_ are comparing it to the libraries listed below
Sorting:
- NIST 800-53 Baseline Configuration Tool☆15Aug 23, 2024Updated last year
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆107Jan 2, 2025Updated last year
- Rapid MDC deployments☆22Jan 5, 2024Updated 2 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- Ansible-based deployment automation for the OpenConext platform☆14Updated this week
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- A specification for DID create/update/deactivate operations.☆11Jan 3, 2025Updated last year
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year
- 💪 Working 8 hours a day in front of a computer exposes you to specific health challenges. This guide provides community tips on improvin…☆12Aug 23, 2023Updated 2 years ago
- ☆11Jan 3, 2023Updated 3 years ago
- [Deprecated] This solution helps customers reduce operational complexity and enables administrators to quickly create manual, event-based…☆14Mar 8, 2023Updated 2 years ago
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- 🔐 Google Cloud Workload Identity Federation Examples and How-To☆12Nov 24, 2025Updated 3 months ago
- OCSF Schema Validation☆13Dec 13, 2024Updated last year
- ☆10Aug 11, 2025Updated 6 months ago
- ☆11Jan 17, 2025Updated last year
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆66Updated this week
- Make AWS IAM policies smaller by adding wildcards to actions.☆19Feb 25, 2026Updated last week
- Synthesising graphs and simulating things☆10Oct 25, 2022Updated 3 years ago
- IETF RATS terms cheat sheet☆12Feb 4, 2023Updated 3 years ago
- Automate rule management for AWS Network Firewall☆17Feb 22, 2026Updated last week
- This is a project to quickly accelerate the adoption of CloudFormation Guard syntax for use in AWS Config rules. The advantage of CloudF…☆12Dec 4, 2024Updated last year
- Set up and manage Exchange Online for a small (fictitious) start-up company.☆14Nov 19, 2024Updated last year
- Azure - IaaS Storage Monitoring☆11Feb 21, 2023Updated 3 years ago
- ☆12Sep 8, 2025Updated 5 months ago
- ☆10Apr 10, 2019Updated 6 years ago
- ☆18Oct 2, 2025Updated 5 months ago
- Stream Lookup function for GrayLog2 Pipeline Processor☆14Oct 1, 2021Updated 4 years ago