grcbit / grcLinks
GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to manage technology risks.
☆19Updated 2 years ago
Alternatives and similar repositories for grc
Users that are interested in grc are comparing it to the libraries listed below
Sorting:
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 5 months ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆10Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆46Updated 2 years ago
- A self-assessment tool by @NC3-LU to help business owners implement a better cybersecurity strategy.☆25Updated 2 months ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆35Updated 3 weeks ago
- Technical Tabletop Exercises Simulation Framework☆47Updated last year
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆26Updated 3 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- ☆21Updated 2 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆54Updated 2 years ago
- This script is to build Wazuh 4.3 environment☆12Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated last week
- OWASP Foundation Web Respository☆31Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- URL fingerprinting made easy☆87Updated last year
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆19Updated 3 years ago
- A collection of reports and case studies to understand the threat landscape for UK critical infrastructure☆39Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆25Updated 3 weeks ago
- The Measure, Maximize, and Mature Threat-Informed Defense (M3TID) project defines what Threat-Informed Defense (TID) is and the key activ…☆16Updated 3 weeks ago
- Virtual Security Operations Center☆51Updated last year
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- Nessus Audit files☆33Updated 2 years ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆45Updated last year