NIST CSF Maturity Toolkit
☆116Jun 6, 2025Updated 9 months ago
Alternatives and similar repositories for NIST_CSF_Maturity_Tool
Users that are interested in NIST_CSF_Maturity_Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ISO 27001 related resources.☆25Mar 18, 2026Updated last week
- NIST 800-53 Baseline Configuration Tool☆15Aug 23, 2024Updated last year
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- ☆19Apr 8, 2023Updated 2 years ago
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆11Feb 5, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆26Jan 30, 2022Updated 4 years ago
- MCP server implementation for NIST Cybersecurity Framework 2.0☆54Dec 6, 2025Updated 3 months ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 3 months ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- A new era for SOCs begins☆24Jun 4, 2025Updated 9 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- INVENTORY é um painel web que exibe dados extraídos da API do Wazuh, via SysCollector. A solução oferece acesso rápido a detalhes do sis…☆47Jan 1, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Comunidade Brasileira de Cibersegurança☆23Oct 6, 2025Updated 5 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Key risk indicator (KRI) for risk management and business strategy☆29Apr 14, 2025Updated 11 months ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆36Jul 10, 2017Updated 8 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆41Feb 25, 2026Updated last month
- ☆54Updated this week
- A curated list of 20 free hacking books that cover various aspects of cybersecurity, ethical hacking, and penetration testing. This repos…☆38Dec 15, 2025Updated 3 months ago
- ☆15Oct 6, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- ☆10Jan 14, 2015Updated 11 years ago
- Darc Viewpoint (Cybersecurity Assets & Threats Modeling analysis)☆22Jan 20, 2026Updated 2 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆53Dec 12, 2025Updated 3 months ago
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- ATT&CK Sync is a Center for Threat-Informed Defense project that aims to improve the ability for organizations to consume MITRE ATT&CK® v…☆24Dec 5, 2025Updated 3 months ago
- KQL Cafe Website☆15Mar 17, 2026Updated last week
- Website for ASD's Blueprint for Secure Cloud☆105Mar 11, 2026Updated 2 weeks ago
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Compliance Scorecard OSCAL Policy Standards☆25May 6, 2024Updated last year
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- CompTIA IT Fundamentals ITF+ (FCO-U61) Exam Prep Course, published by Packt☆13Jan 30, 2023Updated 3 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- A tool to check microsofts user real endpoint to get data about a tenant.☆16Feb 6, 2025Updated last year
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,208Feb 20, 2026Updated last month