A Secure Controls Framework (SCF) Power BI App
☆26Nov 3, 2024Updated last year
Alternatives and similar repositories for SCFBagel
Users that are interested in SCFBagel are comparing it to the libraries listed below
Sorting:
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- NIST 800-53 Baseline Configuration Tool☆15Aug 23, 2024Updated last year
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- Generate a matrix based on an inventory of InfoSec tools☆23Jul 4, 2024Updated last year
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆107Jan 2, 2025Updated last year
- ☆18Jul 30, 2024Updated last year
- Build security program documentation using Git and Markdown☆27Jan 26, 2026Updated last month
- ☆45Apr 10, 2024Updated last year
- Rapid MDC deployments☆22Jan 5, 2024Updated 2 years ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Updated this week
- This repository contains a comprehensive set of Conditional Access (CA) policies and PowerShell management tools for Microsoft Entra ID (…☆104Mar 11, 2025Updated 11 months ago
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- The purpose this solution provides is automated notifications for how many passed, not passed, failed, and warning findings for each memb…☆10Dec 5, 2022Updated 3 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Feb 25, 2026Updated last week
- A specification for DID create/update/deactivate operations.☆11Jan 3, 2025Updated last year
- ☆10Dec 19, 2023Updated 2 years ago
- Getting started guides to deploy the SIGHUP Distribution (SD) in different environments☆15Feb 25, 2026Updated last week
- Go implementation of OpenID Federation☆12Updated this week
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- GitHub Action that generates and commits a live SVG world map of cyber threats using Shodan data.☆23Updated this week
- ☆12Jun 17, 2024Updated last year
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- RGCN model for real-time fraud detection☆11Jan 27, 2023Updated 3 years ago
- Use Neo4j to help visualize, explore and analyze GCP resources and IAM across your organization☆11Sep 1, 2020Updated 5 years ago
- LLM supported Toolkit for Blue Team/ SOC Operations☆46Jan 10, 2026Updated last month
- ☆10Aug 11, 2025Updated 6 months ago
- ☆11Jan 3, 2023Updated 3 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- [Deprecated] This solution helps customers reduce operational complexity and enables administrators to quickly create manual, event-based…☆14Mar 8, 2023Updated 2 years ago
- notes on applied computer security☆12Jun 27, 2023Updated 2 years ago
- Microsoft Azure scripts☆14Dec 29, 2024Updated last year