SerNet / veriniceLinks
verinice is a tool for managing information security.
☆200Updated 4 months ago
Alternatives and similar repositories for verinice
Users that are interested in verinice are comparing it to the libraries listed below
Sorting:
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆138Updated 2 years ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆106Updated last week
- Keycloak Configuration Auditor☆32Updated this week
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆74Updated last week
- Docker helper files for running eramba software☆48Updated last week
- 34 Policy Templates☆88Updated last year
- Cumulus. Threat modeling the Clouds.☆22Updated 9 months ago
- OWASP SecurityRAT (version 1.x) - Tool for handling security requirements in development☆181Updated 6 months ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆95Updated 4 years ago
- The Elevation of Privilege Threat Modeling Game☆330Updated last year
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆287Updated last week
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆139Updated last month
- An open source, self-service GRC tool to automate security assessments and compliance.☆192Updated 6 months ago
- A web privacy measurement platform☆125Updated 4 years ago
- Add a layer of active defense to your cloud applications.☆92Updated last week
- Useful scripts to maintain i-doit☆21Updated 2 months ago
- OpenXPKI Code☆616Updated this week
- ☆110Updated 11 months ago
- Univention Corporate Server☆235Updated this week
- OASIS CSAF TC: Supporting version control for Work Product artifacts developed by members of TC, including prose specifications and secon…☆174Updated this week
- Up-to-date multifactor authentication for academic institutions.☆49Updated this week
- Industrial Information Security Management System☆104Updated 4 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- ☆80Updated 8 months ago
- Evolveum MidPoint: Identity Management (IDM) and Identity Governance (IGA)☆409Updated last week
- Advisories, guidance, best practice documents and more issued by members of the EU CSIRTs network, a network composed of EU Member States…☆82Updated 2 months ago
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆566Updated 3 weeks ago
- LSC engine☆118Updated 2 weeks ago
- Scripts to import OSCAL example content into the Neo4J graph database☆28Updated 2 years ago
- Agile Threat Modeling Toolkit☆676Updated last week