cisagov / ScubaGogglesLinks
SCuBA Secure Configuration Baselines and assessment tool for Google Workspace
☆272Updated this week
Alternatives and similar repositories for ScubaGoggles
Users that are interested in ScubaGoggles are comparing it to the libraries listed below
Sorting:
- Scripts to streamline the deployment and use of the CrowdStrike Falcon sensor☆196Updated this week
- CISA's space for collaboration on the Cybersecurity Performance Goals.☆75Updated 7 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆101Updated 10 months ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆264Updated 2 months ago
- NIST CSF Maturity Toolkit☆110Updated 5 months ago
- Discover for Cloud and Containers Azure☆29Updated last month
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆22Updated 3 weeks ago
- Maturity models help integrate traditionally separate organizational functions, set process improvement goals and priorities, provide gui…☆258Updated 4 months ago
- CISA's catalog of bad practices that are exceptionally risky.☆211Updated this week
- This GitHub page shows the CISO Tradecraft Podcast broken down by Topic☆139Updated last week
- NIST CyberSecurity Framework management tool☆166Updated 3 years ago
- Simple hunting script for suspicious M365 OAuth Apps☆315Updated last month
- Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and evict…☆152Updated 3 weeks ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆938Updated 4 months ago
- A Secure Controls Framework (SCF) Power BI App☆22Updated last year
- A tool that allows you to document and assess any security automation in your SOC☆47Updated last year
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆76Updated last month
- A set of policies, standards and control procedures with mapping to HIPAA, NIST CSF, PCI DSS, SOC2, FedRAMP, CIS Controls, and more.☆329Updated last year
- ☆77Updated 2 weeks ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆236Updated last week
- InsightVM helpful SQL queries☆75Updated 9 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆679Updated last month
- A self assessment tool to help understand your level in the SANS Vulnerability Management Maturity Model (VMMM).☆46Updated 8 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆166Updated this week
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆83Updated 2 months ago
- 🚨ATTENTION🚨 The Security Stack Mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is k…☆389Updated last year
- ALFA stands for Automated Audit Log Forensic Analysis for Google Workspace. You can use this tool to acquire all Google Workspace audit l…☆163Updated 8 months ago
- Website for ASD's Blueprint for Secure Cloud☆96Updated 3 weeks ago
- Powershell Based tool for gathering information related to O365 intrusions and potential Breaches☆17Updated 10 months ago
- WA Cyber Security Unit (DGOV Technical) site☆44Updated last week