cisagov / ScubaGogglesLinks
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
☆250Updated this week
Alternatives and similar repositories for ScubaGoggles
Users that are interested in ScubaGoggles are comparing it to the libraries listed below
Sorting:
- ☆262Updated 8 months ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆239Updated last month
- Scripts to streamline the deployment and use of the CrowdStrike Falcon sensor☆179Updated last week
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆93Updated 7 months ago
- NIST CSF Maturity Toolkit☆45Updated 2 months ago
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆132Updated this week
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 4 months ago
- ☆138Updated 2 weeks ago
- CISA's catalog of bad practices that are exceptionally risky.☆209Updated 2 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆932Updated 3 weeks ago
- A Secure Controls Framework (SCF) Power BI App☆21Updated 9 months ago
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆72Updated 9 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆385Updated last year
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆319Updated last year
- ☆73Updated 11 months ago
- Discover for Cloud and Containers Azure☆29Updated 6 months ago
- WA Cyber Security Unit (DGOV Technical) site☆39Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆658Updated 2 weeks ago
- Simple hunting script for suspicious M365 OAuth Apps☆289Updated 5 months ago
- Unleash the power of the Falcon Platform at the CLI☆122Updated last month
- Website for ASD's Blueprint for Secure Cloud☆86Updated this week
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆161Updated this week
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆165Updated 5 months ago
- A cheatsheet containing AWS CloudTrail events that can be used for Incident Response purposes or Detection Engineering.☆76Updated last year
- InsightVM helpful SQL queries☆69Updated 5 months ago
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆209Updated this week
- A tool that allows you to document and assess any security automation in your SOC☆46Updated 9 months ago
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆80Updated 4 months ago
- ✨ A compilation of suggested tools/services for each component in a detection and response pipeline, along with real-world examples. The …☆281Updated last year