Generate a matrix based on an inventory of InfoSec tools
☆23Jul 4, 2024Updated last year
Alternatives and similar repositories for CDM-Generator
Users that are interested in CDM-Generator are comparing it to the libraries listed below
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- This Grafana dashboard offers a centralized view of Azure orphan resources that can be safely removed to reduce the overall cost of ownin…☆17Oct 22, 2024Updated last year
- ☆45Apr 10, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- ☆30Aug 2, 2025Updated 6 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- ☆12Jun 9, 2021Updated 4 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- IT Risk Management tools☆14Apr 4, 2025Updated 10 months ago
- This repo is for the Linkedin Learning course: Terraform: Managing Network Infrastructure☆12Mar 29, 2024Updated last year
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- ☆36Updated this week
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Dec 8, 2025Updated 2 months ago
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- Implementing ISO/IEC 27001:2022, by EC-Council☆15Feb 20, 2026Updated last week
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 3 months ago
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- ADXFlowmaster helps SecOps teams Threat Hunt suspicious network traffic inside & outside of Azure.☆40Oct 30, 2024Updated last year
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Feb 17, 2025Updated last year
- ☆20Jan 12, 2022Updated 4 years ago
- ☆13Mar 1, 2024Updated 2 years ago
- ☆11Apr 1, 2025Updated 11 months ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Chef Cookbook for applying CIS Benchmark settings to Windows 10 systems☆14Aug 5, 2018Updated 7 years ago
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated 2 months ago
- LLM supported Toolkit for Blue Team/ SOC Operations☆45Jan 10, 2026Updated last month
- ☆12Oct 22, 2023Updated 2 years ago
- Chef Cookbook for applying CIS Benchmark settings to Windows 2016 systems☆13May 23, 2019Updated 6 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated last year
- Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests☆17Jun 22, 2024Updated last year
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 3 years ago
- ☆10Sep 20, 2020Updated 5 years ago
- ☆55Jan 19, 2026Updated last month
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆16May 17, 2016Updated 9 years ago
- MISP Playbooks☆222Oct 14, 2025Updated 4 months ago