Cybersecurity Evaluation Tool
☆1,805Apr 9, 2026Updated this week
Alternatives and similar repositories for cset
Users that are interested in cset are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,380Updated this week
- Sparrow.ps1 was created by CISA's Cloud Forensics team to help detect possible compromised accounts and applications in the Azure/m365 en…☆1,428Dec 27, 2022Updated 3 years ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,212Feb 20, 2026Updated last month
- A set of guidelines and best practices for an awesome engineering team☆273Mar 26, 2026Updated 2 weeks ago
- CISA's catalog of bad practices that are exceptionally risky.☆209Mar 26, 2026Updated 2 weeks ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,522Updated this week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,409Updated this week
- GOAL: Incident Response Playbooks Mapped to MITRE Attack Tactics and Techniques. [Contributors Friendly]☆1,551Jul 28, 2024Updated last year
- RedEye is a visual analytic tool supporting Red & Blue Team operations☆2,744Oct 20, 2023Updated 2 years ago
- Memory Forensic System on Cloud☆92Dec 21, 2023Updated 2 years ago
- A Library of various cybersecurity resources☆2,530Feb 24, 2024Updated 2 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆5,228Jul 15, 2024Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,793Apr 6, 2026Updated last week
- Automated Adversary Emulation Platform☆6,886Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Search a filesystem for indicators of compromise (IoC).☆85Updated this week
- External monitoring for organization assets☆421Jun 5, 2024Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,277Jan 21, 2026Updated 2 months ago
- A DFIR tool written in Python.☆1,054Jun 9, 2021Updated 4 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆48Feb 3, 2026Updated 2 months ago
- Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in…☆952Feb 11, 2026Updated 2 months ago
- A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more e…☆4,526Jan 12, 2026Updated 3 months ago
- A knowledge base of actionable Incident Response techniques☆665May 31, 2022Updated 3 years ago
- Open Cyber Threat Intelligence Platform☆9,128Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,925Feb 26, 2026Updated last month
- ☆2,397Oct 14, 2023Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Jan 12, 2026Updated 3 months ago
- Main Sigma Rule Repository☆10,309Apr 1, 2026Updated last week
- TrustedSec Sysinternals Sysmon Community Guide☆1,391Feb 10, 2026Updated 2 months ago
- MISP (core software) - Open Source Threat Intelligence and Sharing Platform☆6,231Updated this week
- A tool that allows you to create vulnerable instrumented local or cloud environments to simulate attacks against and collect the data int…☆2,467Apr 7, 2026Updated last week
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated 3 weeks ago
- Contact: CRT@crowdstrike.com☆751Apr 27, 2023Updated 2 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Configuration Hardening Assessment PowerShell Script (CHAPS)☆190Aug 22, 2025Updated 7 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,534Updated this week
- A toolset to make a system look as if it was the victim of an APT attack☆2,725Sep 23, 2025Updated 6 months ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,304Jun 1, 2023Updated 2 years ago
- A curated list of tools for incident response☆8,951Jul 18, 2024Updated last year
- 🚨ATTENTION🚨 The NIST 800-53 mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept…☆496Apr 3, 2024Updated 2 years ago
- ☆2,666Mar 5, 2024Updated 2 years ago