NIST CSF Maturity Toolkit
☆117Jun 6, 2025Updated 10 months ago
Alternatives and similar repositories for NIST_CSF_Maturity_Tool
Users that are interested in NIST_CSF_Maturity_Tool are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆18Apr 3, 2026Updated last week
- ISO 27001 related resources.☆23Updated this week
- NIST 800-53 Baseline Configuration Tool☆15Aug 23, 2024Updated last year
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- ☆19Apr 8, 2023Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- All credits to Matt Walker (Author of "CEH Certified Ethical Hacker All-in-One Exam Guide" ISBN 1264269943)☆11Feb 5, 2022Updated 4 years ago
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆26Jan 30, 2022Updated 4 years ago
- The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality …☆16Updated this week
- ☆31Mar 18, 2026Updated 3 weeks ago
- ☆37Nov 22, 2023Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Palo Alto Networks Rule Parser☆16Aug 26, 2016Updated 9 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- A new era for SOCs begins☆24Jun 4, 2025Updated 10 months ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Source code and examples for Antignis☆44Oct 21, 2022Updated 3 years ago
- INVENTORY é um painel web que exibe dados extraídos da API do Wazuh, via SysCollector. A solução oferece acesso rápido a detalhes do sis…☆51Apr 4, 2026Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 4 years ago
- Key risk indicator (KRI) for risk management and business strategy☆29Apr 14, 2025Updated last year
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆37Jul 10, 2017Updated 8 years ago
- ☆14Jan 8, 2026Updated 3 months ago
- NIST SP 800-53, Security and Privacy Controls for Federal Information Systems and Organizations☆41Feb 25, 2026Updated last month
- ☆59Apr 3, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆15Oct 6, 2024Updated last year
- An ongoing collection of of AWS tools, frameworks, libraries, learning tutorials for InfoSec and security professionals☆23Dec 16, 2021Updated 4 years ago
- A PowerShell script to audit privileged users in Microsoft Entra ID and Azure with detailed reporting☆54Sep 29, 2025Updated 6 months ago
- Website for ASD's Blueprint for Secure Cloud☆108Mar 11, 2026Updated last month
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- A curated collection of security tools, frameworks, and resources for Enumeration, Cloud Security, Static Analysis, Threat Intelligence, …☆22Dec 2, 2025Updated 4 months ago
- collection of materials and resources I use to teach computer security classes☆12Jun 25, 2021Updated 4 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Build security program documentation using Git and Markdown☆28Jan 26, 2026Updated 2 months ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- Interactive CRQ Monte Carlo simulation tool for quantifying cybersecurity risk using FAIR methodology. Built for EU SMBs, vCISOs, and sec…☆30Dec 5, 2025Updated 4 months ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,212Feb 20, 2026Updated last month
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆1,012Sep 7, 2025Updated 7 months ago
- Archive of the Information Secuity policy documentation for Greater Manchester CHC that conforms to ISO27001☆14Apr 19, 2020Updated 5 years ago
- ☆13Jan 5, 2026Updated 3 months ago