TalEliyahu / awesome-CISO-maturity-modelsView external linksLinks
Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide guidance for quality processes, and provide benchmark for appraising current processes outcomes.
☆263Jul 5, 2025Updated 7 months ago
Alternatives and similar repositories for awesome-CISO-maturity-models
Users that are interested in awesome-CISO-maturity-models are comparing it to the libraries listed below
Sorting:
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆483Jun 12, 2025Updated 8 months ago
- Watch the latest awesome security talks around the globe☆279Feb 23, 2025Updated 11 months ago
- Miscellaneous parsing scripts for penetration testing☆12Jul 17, 2023Updated 2 years ago
- Periodic cyber security newsletters that capture the latest news, summaries of conference talks, research, best practices, tools, events,…☆1,225Feb 5, 2026Updated last week
- This is the Network Flow Generator for ICSSIM☆16Aug 28, 2025Updated 5 months ago
- Questions to ask about the team and company when you're interviewing for a CISO position☆15Oct 19, 2021Updated 4 years ago
- A collection of resources, tools and more for penetration testing and securing Microsofts cloud platform Azure.☆1,177Dec 27, 2023Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated this week
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆144Jan 2, 2026Updated last month
- ☆20May 30, 2025Updated 8 months ago
- M365 Defender SOC Playbooks☆24Feb 6, 2023Updated 3 years ago
- CA Optics - Azure AD Conditional Access Gap Analyzer☆334Aug 28, 2024Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆334Jan 12, 2026Updated last month
- Some of the tools we use during vCISO engagements☆17Apr 23, 2022Updated 3 years ago
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- Reports from various areas of information security☆271Apr 13, 2024Updated last year
- A fast and comprehensive tool for organizational network scanning☆134Apr 15, 2024Updated last year
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Apr 9, 2025Updated 10 months ago
- Continuous Threat Exposure Management Maturity Model (CTEMMM)☆29Feb 6, 2026Updated last week
- ☆185Updated this week
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆974Sep 7, 2025Updated 5 months ago
- This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and …☆2,468Dec 31, 2025Updated last month
- A toolkit to attack Office365☆16Aug 1, 2019Updated 6 years ago
- Open source templates you can use to bootstrap your security programs☆887Dec 28, 2025Updated last month
- Incident Response Methodologies 2022☆1,101Apr 11, 2025Updated 10 months ago
- Mapping of open-source detection rules and atomic tests.☆195Updated this week
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,621Updated this week
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,707Aug 2, 2024Updated last year
- Conference presentation slides☆2,364Nov 15, 2025Updated 3 months ago
- Delving into the Realm of LLM Security: An Exploration of Offensive and Defensive Tools, Unveiling Their Present Capabilities.☆166Oct 13, 2023Updated 2 years ago
- Audit tool for Active Directory. Automates a lot of checks from a pentester perspective.☆175Jul 7, 2025Updated 7 months ago
- Detect Tactics, Techniques & Combat Threats☆2,263Jan 21, 2026Updated 3 weeks ago
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,450Updated this week
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆497Apr 3, 2024Updated last year
- Systematic Universal Security Testing Orchestration☆37Mar 28, 2022Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,515Feb 5, 2026Updated last week
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,570Feb 8, 2026Updated last week
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Feb 2, 2024Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Feb 2, 2025Updated last year