grcbit / grcLinks
GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to manage technology risks.
☆25Updated 2 years ago
Alternatives and similar repositories for grc
Users that are interested in grc are comparing it to the libraries listed below
Sorting:
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Updated 4 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆29Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 11 months ago
- URL fingerprinting made easy☆90Updated last year
- Technical Tabletop Exercises Simulation Framework☆48Updated 2 years ago
- Small web frontend for using openAI's GPT-3.5 and GPT-4's API☆59Updated 9 months ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆46Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 4 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆36Updated 4 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 6 months ago
- ☆20Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆24Updated 2 years ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆36Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆60Updated 3 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated last month
- A web API for various cyber threat intelligence frameworks, including MITRE ATT&CK, CWE, ATLAS...☆19Updated last week
- Workflows for Shuffle☆24Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆38Updated 8 months ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆17Updated 3 years ago
- A collection of scripts, tools. and configs for various OS'es and applications, all free and or open-source, to assist in impromptu Blue-…☆103Updated last year
- 🧬 Mitre Interactive Network Graph (APTs, Malware, Tools, Techniques & Tactics)☆102Updated 3 years ago
- Nessus Audit files☆32Updated 2 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆64Updated 3 weeks ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆50Updated last year
- ☆80Updated 2 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated last week
- ☆52Updated 5 months ago