Playbook-NG is a stateless web-based application used to match incident findings with countermeasures for adversary containment and eviction.
☆159Mar 5, 2026Updated last month
Alternatives and similar repositories for playbook-ng
Users that are interested in playbook-ng are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated last month
- AWSDoor is a red team automation tool designed to simulate advanced attacker behavior in AWS environments☆34Sep 17, 2025Updated 7 months ago
- Cyber Threat Intelligence☆79Dec 7, 2025Updated 4 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆997Mar 5, 2026Updated last month
- AI-powered cybersecurity attack flow visualization tool using MITRE ATT&CK☆215Mar 4, 2026Updated last month
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated 3 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Jan 20, 2022Updated 4 years ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆100Apr 11, 2026Updated last week
- LLM Agent Skill for YARA rule authoring and review☆39Feb 8, 2026Updated 2 months ago
- Fast and easy to use CLI-based file encryption program 📦☆13Oct 12, 2025Updated 6 months ago
- Your Browser-based EVTX Companion☆116Mar 2, 2026Updated last month
- AcSecurity is a Python module designed to scan applications for common security vulnerabilities. It checks for hardcoded secrets, depende…☆16Aug 29, 2025Updated 7 months ago
- Deptective automatically determines the native dependencies required to run any arbitrary program or command.☆130Apr 8, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Organizational asset discovery tool with 20+ plugins covering certificate transparency, passive DNS, and all 5 Regional Internet Registri…☆57Apr 13, 2026Updated last week
- BlueSky OSINT Tool☆14Dec 10, 2024Updated last year
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Apr 8, 2026Updated last week
- ☆39Jul 31, 2025Updated 8 months ago
- SimpleCrypt is a powerful command-line tool designed for securely encrypting and decrypting files and directories using AES-256 encryptio…☆20Mar 22, 2026Updated 3 weeks ago
- The official website for The Discord Analytics for Risks & Threats Project.☆22Dec 29, 2025Updated 3 months ago
- ☆18Feb 2, 2026Updated 2 months ago
- Native cloud infrastructure for automatically running ScubaGear/ScubaGoggles☆36Updated this week
- CLI tool to generate terraform files from existing ZPA and ZIA☆24Apr 3, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆27Mar 5, 2026Updated last month
- For Blend API OpenAPI Specifications and Related Postman Collections☆11Mar 1, 2024Updated 2 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated 2 years ago
- How I use Tailscale in my homelab☆30Nov 11, 2024Updated last year
- Security Blogs - A simple aggregator for security news/blog☆25Mar 31, 2026Updated 2 weeks ago
- Open source templates you can use to bootstrap your security programs☆900Dec 28, 2025Updated 3 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 3 weeks ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Dec 2, 2024Updated last year
- Documentation of vmc☆16Mar 4, 2025Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆42Oct 20, 2020Updated 5 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 2 months ago
- Advanced SQLMap command builder with an intuitive cheatsheet UI. Works locally in your browser as a single HTML file (no data sent anywhe…☆34Jul 6, 2025Updated 9 months ago
- Draugnet is a lightweight, open-source tool for anonymous cyber threat reporting. Built for the MISP ecosystem, it lets users submit and …☆20Mar 24, 2026Updated 3 weeks ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Mapping of open-source detection rules and atomic tests.☆206Feb 16, 2026Updated 2 months ago
- Hijack a slack bot to phish your way in☆57Jul 17, 2025Updated 9 months ago