NIST CSF Maturity Toolkit
☆115Jun 6, 2025Updated 8 months ago
Alternatives and similar repositories for NIST_CSF_Maturity_Tool
Users that are interested in NIST_CSF_Maturity_Tool are comparing it to the libraries listed below
Sorting:
- ISO 27001 related resources.☆23Updated this week
- The CIA Compliance Manager is an application that helps organizations assess and manage the availability, integrity, and confidentiality …☆15Updated this week
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Mar 17, 2022Updated 3 years ago
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- Code that implements Factor Analysis of Information Risk (FAIR) in combination with MITRE ATT&CK using Markov Chain Monte Carlo (via PyMC…☆44Dec 10, 2025Updated 2 months ago
- ☆53Feb 23, 2026Updated last week
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year
- A collection of awesome framework, libraries, documents, learning tutorials, resources about SOC 2 tools and processes.☆25Jan 30, 2022Updated 4 years ago
- A new era for SOCs begins☆24Jun 4, 2025Updated 9 months ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- MCP server implementation for NIST Cybersecurity Framework 2.0☆52Dec 6, 2025Updated 2 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆33Feb 16, 2026Updated 2 weeks ago
- AI Security Shared Responsibility Model☆89Sep 26, 2025Updated 5 months ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- An open source Governance Risk Compliance (GRC) solution for corporates and government☆35Jul 10, 2017Updated 8 years ago
- INVENTORY é um painel web que exibe dados extraídos da API do Wazuh, via SysCollector. A solução oferece acesso rápido a detalhes do sis…☆46Jan 1, 2026Updated 2 months ago
- Scripts for accessing and transforming cyber threat intelligence☆26Nov 22, 2015Updated 10 years ago
- A PowerShell script to audit privileged users in Microsoft Entra ID and Azure with detailed reporting☆52Sep 29, 2025Updated 5 months ago
- ☆37Nov 22, 2023Updated 2 years ago
- One Day of Python for SaintCon 2022☆11Jan 3, 2023Updated 3 years ago
- Threat Intelligence distribution☆31Dec 30, 2015Updated 10 years ago
- Repo for user submitted stencils☆13Jun 9, 2022Updated 3 years ago
- AppSecPipeline Specification for DevOps automation.☆40Dec 8, 2022Updated 3 years ago
- Website for ASD's Blueprint for Secure Cloud☆104Feb 25, 2026Updated last week
- ☆40Nov 29, 2024Updated last year
- A collection of my Semgrep rules☆51Jul 4, 2023Updated 2 years ago
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆495Apr 3, 2024Updated last year
- Solutions for access (APM) related use cases.☆10Apr 19, 2023Updated 2 years ago
- Minimalistic lightweight toolbox for secure virtual private networks☆12Mar 30, 2016Updated 9 years ago
- ☆10Dec 19, 2023Updated 2 years ago
- ☆12Jul 23, 2025Updated 7 months ago
- 🔥 CEHv12 Certificate documentation 📚☆10Jun 29, 2023Updated 2 years ago
- Convert with Policy Supervisor Tutorial☆10Nov 13, 2023Updated 2 years ago
- Modern Honey Network deployment with ansible☆12Jun 4, 2022Updated 3 years ago
- A collection of phishing techniques used to evade detection. #nolockdown☆23Aug 28, 2025Updated 6 months ago
- ☆67Jan 20, 2026Updated last month
- ☆13Nov 5, 2024Updated last year