grcbit / grcLinks
GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to manage technology risks.
☆22Updated 2 years ago
Alternatives and similar repositories for grc
Users that are interested in grc are comparing it to the libraries listed below
Sorting:
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Updated 2 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆27Updated 3 years ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆58Updated 2 years ago
- ☆19Updated 4 years ago
- Technical Tabletop Exercises Simulation Framework☆48Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 9 months ago
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- ☆25Updated 2 years ago
- Really can protect from ransomware encryption?☆46Updated last year
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆35Updated 3 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- Sightings Ecosystem gives cyber defenders visibility into what adversaries actually do in the wild. With your help, we are tracking MITRE…☆37Updated 5 months ago
- Intelligence around common attacker behaviors (MITRE ATT&CK TTPs), in the form of ATT&CK Navigator "layer" json files.☆35Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆52Updated 2 years ago
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆46Updated 4 months ago
- Collection of Dashboards for Threat Hunting and more!☆70Updated 5 years ago
- An experimental Velociraptor implementation using cloud infrastructure☆26Updated 2 weeks ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆50Updated 3 weeks ago
- Virus Total Free - IOC parser and report generator☆23Updated 2 years ago
- The ICS Advisory Project is an open-source project to provide DHS CISA ICS Advisories data in Comma Separated Value (CSV) format to suppo…☆87Updated this week
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆43Updated 2 weeks ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 7 months ago
- ☆22Updated 2 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 4 months ago
- A new Cyber Threat Intelligence Capability Maturity Model (CTI-CMM) to empower your team and create lasting value. Inspired by Industry N…☆40Updated 6 months ago
- A collection of awesome software, libraries, documents, books, resources and cool stuff about industrial control systems in cybersecurity…☆33Updated 9 months ago