dbarzin / demingLinks
Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'information
☆315Updated 3 weeks ago
Alternatives and similar repositories for deming
Users that are interested in deming are comparing it to the libraries listed below
Sorting:
- Mapping the information system / Cartographie du système d'information☆455Updated this week
- SwitchToOpen - The open source shift☆302Updated 3 weeks ago
- ☆164Updated last month
- This project is specifically made for brand new directory and ease their creation with all security rules in place.☆123Updated 3 weeks ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆744Updated 3 months ago
- Hardening Active Directory version 2☆362Updated this week
- A user-friendly solution to transfer files through a physical diode using the Lidi utility, complete with data retention, file history, u…☆152Updated 6 months ago
- ☆12Updated 10 months ago
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆628Updated 5 months ago
- SOCFortress CoPilot☆417Updated this week
- Captures network traffic app made in Rust.☆74Updated last week
- Protect your data in minutes !☆125Updated last year
- Data-Shield IPv4 Blocklist contains the latest data for blocking IPs generating malicious traffic and activities.☆356Updated this week
- ☆218Updated last year
- Useful templates and working document for implementing ISO 27001 - ISMS☆198Updated 7 months ago
- ISO 27001 certification requires organizations to prove their compliance with the Standard with appropriate documentation, which can run …☆112Updated 5 years ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,169Updated last week
- ⚡️ Catalyst is a self-hosted, open source incident response platform and ticket system that helps to automate alert handling and incident…☆495Updated 3 weeks ago
- Virus cleaning station/gateway☆61Updated 3 weeks ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆415Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆412Updated 2 months ago
- Outils ESD academy☆61Updated 3 years ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆485Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆680Updated 2 months ago
- Speed up your pentest enumeration☆83Updated 2 months ago
- Generate MITRE ATT&CK and D3FEND from a list of CVEs. Database with CVE, CWE, CAPEC, MITRE ATT&CK and D3FEND Techniques data is updated d…☆254Updated this week
- A production ready Dockered MISP☆298Updated this week
- Cerberus is a Python client-server program to implement a complex port knocking system preventing playback attacks on an exposed server.☆74Updated last year
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆238Updated last week
- ☆42Updated last year