grcbit / grc
GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to manage technology risks.
☆16Updated 2 years ago
Alternatives and similar repositories for grc:
Users that are interested in grc are comparing it to the libraries listed below
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆22Updated 2 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆15Updated last month
- ☆19Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Technical Tabletop Exercises Simulation Framework☆47Updated last year
- Technical cyber security resources across the NIST cyber security framework lifecycle☆10Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆40Updated 2 years ago
- A collection of Sigma rules organized by MITRE ATT&CK technique☆17Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆40Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- ☆16Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆52Updated 2 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆38Updated 3 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆18Updated last year
- List of sources for cybersecurity news☆36Updated 2 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Workflows for Shuffle☆21Updated 2 years ago
- Helpful tools for interacting with a GoPhish phishing instance☆43Updated 2 weeks ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- This script is to build Wazuh 4.3 environment☆12Updated 2 years ago
- OWASP Foundation Web Respository☆29Updated 2 years ago
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- Ransomware for demonstration☆15Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆51Updated last year
- OWASP Foundation Web Respository☆46Updated 3 weeks ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆39Updated 11 months ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago