Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and eviction.
☆157Mar 5, 2026Updated 3 weeks ago
Alternatives and similar repositories for playbook-ng
Users that are interested in playbook-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆30Feb 23, 2026Updated last month
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆31Sep 17, 2025Updated 6 months ago
- Cyber Threat Intelligence☆78Dec 7, 2025Updated 3 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆989Mar 5, 2026Updated 3 weeks ago
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆214Mar 4, 2026Updated 3 weeks ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Updated this week
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Mar 22, 2026Updated last week
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 5 months ago
- Your Browser-based EVTX Companion☆114Mar 2, 2026Updated 3 weeks ago
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆129Feb 27, 2026Updated last month
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Tools to make life easier ^_^☆13Aug 21, 2025Updated 7 months ago
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆110Jul 21, 2025Updated 8 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- A tool to automatically detect copy+pasted and vendored code between repositories☆76Updated this week
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated last week
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 3 months ago
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆34Updated this week
- ☆18Feb 2, 2026Updated last month
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- How I use Tailscale in my homelab☆30Nov 11, 2024Updated last year
- Security Blogs - A simple aggregator for security news/blog☆25Mar 16, 2026Updated 2 weeks ago
- Open source templates you can use to bootstrap your security programs☆897Dec 28, 2025Updated 3 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Feb 20, 2026Updated last month
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- Documentation of vmc☆16Mar 4, 2025Updated last year
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Oct 20, 2020Updated 5 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated last month
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆32Jul 6, 2025Updated 8 months ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 8 months ago
- Quantitative risk simulation tools☆20Aug 18, 2022Updated 3 years ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- ☆154Dec 19, 2024Updated last year