SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
☆297Mar 3, 2026Updated this week
Alternatives and similar repositories for ScubaGoggles
Users that are interested in ScubaGoggles are comparing it to the libraries listed below
Sorting:
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,475Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,380Updated this week
- ☆25Jun 27, 2024Updated last year
- ☆14Jan 8, 2026Updated 2 months ago
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆949Feb 11, 2026Updated 3 weeks ago
- FedRAMP Automation☆355Apr 7, 2025Updated 11 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,242Feb 27, 2026Updated last week
- ☆169Sep 30, 2025Updated 5 months ago
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆173Updated this week
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆33Feb 26, 2026Updated last week
- ☆22Apr 6, 2024Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆120Feb 4, 2026Updated last month
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- ☆40Nov 29, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated 2 months ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆215Mar 2, 2026Updated last week
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆32Aug 8, 2024Updated last year
- This project contains a **test executable** specifically designed to trigger incidents in **Microsoft Defender for Endpoint (MDE)**. It…☆14Jul 20, 2025Updated 7 months ago
- ☆10May 12, 2022Updated 3 years ago
- FedRAMP Documentation☆46Updated this week
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆107Jan 2, 2025Updated last year
- Tool for obfuscating and deobfuscating data.☆76Mar 20, 2024Updated last year
- ☆28Dec 26, 2025Updated 2 months ago
- Add a layer of active defense to your cloud applications.☆104Updated this week
- Knowledge Report Alert & Normalization Generator☆26Feb 11, 2026Updated 3 weeks ago
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆344Feb 19, 2026Updated 2 weeks ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆771Updated this week
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆275May 10, 2025Updated 9 months ago
- Graph-based security analysis for everyone☆357Feb 19, 2026Updated 2 weeks ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated this week
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago