cisagov / ScubaGogglesView external linksLinks
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
☆289Updated this week
Alternatives and similar repositories for ScubaGoggles
Users that are interested in ScubaGoggles are comparing it to the libraries listed below
Sorting:
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,438Feb 6, 2026Updated last week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,371Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆25Jun 27, 2024Updated last year
- ☆14Jan 8, 2026Updated last month
- Repository with supporting materials for Invictus Academy/Training☆44Jan 3, 2025Updated last year
- Azure Activity Log Axe is a continually developing tool that simplifies the transactional log format provided by Microsoft. The tool leve…☆35Sep 6, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆944Updated this week
- FedRAMP Automation☆355Apr 7, 2025Updated 10 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,231Feb 4, 2026Updated last week
- ☆169Sep 30, 2025Updated 4 months ago
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆30Dec 8, 2025Updated 2 months ago
- ☆22Apr 6, 2024Updated last year
- An AI-powered tool for discovering privilege escalation opportunities in AWS IAM configurations.☆117Feb 4, 2026Updated last week
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Oct 20, 2022Updated 3 years ago
- ☆41Nov 29, 2024Updated last year
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆198Jan 6, 2026Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last week
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆32Aug 8, 2024Updated last year
- ☆10May 12, 2022Updated 3 years ago
- FedRAMP Documentation☆39Feb 6, 2026Updated last week
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Tool for obfuscating and deobfuscating data.☆75Mar 20, 2024Updated last year
- Add a layer of active defense to your cloud applications.☆103Updated this week
- Knowledge Report Alert & Normalization Generator☆26Updated this week
- ☆29Dec 26, 2025Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆340Dec 9, 2025Updated 2 months ago
- A PowerShell module for acquisition of data from Microsoft 365 and Azure for Incident Response and Cyber Security purposes.☆765Jan 15, 2026Updated 3 weeks ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Repository of attack and defensive information for Business Email Compromise investigations☆275May 10, 2025Updated 9 months ago
- Graph-based security analysis for everyone☆355Dec 9, 2025Updated 2 months ago
- Public sync with private repo azure-aks-docs-pr☆11Updated this week
- Terraform modules for cloud.gov managed services☆14Updated this week
- Helps you to export your kube-bench reports to multiple targets like Amazon S3 buckets with ease.☆12Apr 3, 2021Updated 4 years ago
- Proof of concept implementation of a cyber threat intelligence and incident handling platform☆11Feb 10, 2023Updated 3 years ago
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 7 months ago
- Kentico <=12.0.14 is vulnerable to a remote code execution via the SyncServer☆10Sep 28, 2020Updated 5 years ago