cisagov / ScubaGogglesLinks
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
☆284Updated this week
Alternatives and similar repositories for ScubaGoggles
Users that are interested in ScubaGoggles are comparing it to the libraries listed below
Sorting:
- Scripts to streamline the deployment and use of the CrowdStrike Falcon sensor☆199Updated last week
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆102Updated last year
- NIST CSF Maturity Toolkit☆114Updated 7 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆944Updated last week
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last month
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆28Updated last month
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆76Updated 9 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆261Updated 6 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆143Updated 2 weeks ago
- The CrowdStrike Falcon SDK for Python☆461Updated 2 weeks ago
- This repository contains Community and Field contributed content for LogScale☆309Updated 2 weeks ago
- A collection of projects supporting Azure Integrations☆31Updated last month
- InsightVM helpful SQL queries☆77Updated 11 months ago
- NIST CyberSecurity Framework management tool☆166Updated 4 years ago
- A Secure Controls Framework (SCF) Power BI App☆26Updated last year
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆12Updated 2 weeks ago
- Simple hunting script for suspicious M365 OAuth Apps☆318Updated 3 months ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆77Updated 3 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- CISA's catalog of bad practices that are exceptionally risky.☆211Updated last month
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆156Updated last month
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆752Updated last week
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆85Updated last month
- PowerShell for CrowdStrike's OAuth2 APIs☆447Updated 2 weeks ago
- WA Cyber Security Unit (DGOV Technical) site☆44Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆169Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆682Updated 2 weeks ago
- OCSF Documentation☆151Updated 3 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆168Updated last week
- Awesome Incident Response☆283Updated 3 months ago