cisagov / XFD
CyHy Dashboard
☆14Updated this week
Alternatives and similar repositories for XFD:
Users that are interested in XFD are comparing it to the libraries listed below
- ☆21Updated 9 months ago
- A generic skeleton project for quickly getting a new cisagov project started.☆18Updated 2 weeks ago
- Save scan results to a database☆12Updated 2 weeks ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆18Updated 2 weeks ago
- Semi-automated bash scripts that provide security hardening for Linux, Debian based, 2024, attempts DISA STIG and CIS Compliance☆39Updated last month
- eMASSer is a command-line interface (CLI) that aims to automate routine business use-cases and provide utility surrounding the Enterprise…☆41Updated this week
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆15Updated 4 years ago
- Automation tool for Windows Deception Host Burn-In☆85Updated 4 months ago
- The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Ze…☆31Updated 10 months ago
- ☆15Updated 3 years ago
- Open source cyber-serenity platform that help the security teams designing and managing companies' ISMS, and which allow them to create r…☆16Updated 3 weeks ago
- Awesome List of Enterprise Security Tools' Community Edition☆14Updated last year
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- (Unofficial) Wazuh integration to send alerts to IRIS.☆17Updated 3 months ago
- The MITRE Security Automation Framework (SAF) Command Line Interface (CLI) brings together applications, techniques, libraries, and tools…☆149Updated last week
- OWASP Ontology-driven Threat Modelling framework☆37Updated last year
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆43Updated 5 years ago
- An application allowing users to explore, create, annotate, and share extensions of the MITRE ATT&CK® knowledge base. This repository con…☆35Updated 5 months ago
- ☆73Updated last month
- Continuous Audit Metrics☆26Updated 10 months ago
- Add a layer of active defense to your cloud applications.☆91Updated this week
- NIST 800-53 Baseline Configuration Tool☆10Updated 8 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆256Updated last week
- OSCAL reusable component definitions library☆12Updated last month
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 2 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- A repository containing OSCAL serializations of the CIS Critical Security Controls☆48Updated last month
- DefectDojo Community Content☆18Updated 6 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆18Updated 2 months ago
- A web application to streamline the development of STIGs from SRGs☆74Updated last month