Generate a matrix based on an inventory of InfoSec tools
☆24Jul 4, 2024Updated last year
Alternatives and similar repositories for CDM-Generator
Users that are interested in CDM-Generator are comparing it to the libraries listed below
Sorting:
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- ☆26Jan 7, 2024Updated 2 years ago
- details about DIAL protocol vulnerabilities☆29Nov 24, 2023Updated 2 years ago
- GTK+ interface for classic Uniden scanners☆10Jul 21, 2021Updated 4 years ago
- ☆45Apr 10, 2024Updated last year
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- This Grafana dashboard offers a centralized view of Azure orphan resources that can be safely removed to reduce the overall cost of ownin…☆18Oct 22, 2024Updated last year
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆110Jan 2, 2025Updated last year
- Installs ADDS and configures a vulnerable domain via a powershell script☆13Jul 13, 2023Updated 2 years ago
- Simple security lookups via CLI☆16Jan 29, 2025Updated last year
- MISP Playbooks☆222Oct 14, 2025Updated 5 months ago
- A curated collection of resources for the zero-trust security model.☆20Jun 10, 2021Updated 4 years ago
- A Risk-Based Prioritization Taxonomy for prioritizing CVEs (Common Vulnerabilities and Exposures).☆83May 3, 2024Updated last year
- This repo is for the Linkedin Learning course: Terraform: Managing Network Infrastructure☆12Mar 29, 2024Updated last year
- Implementing ISO/IEC 27001:2022, by EC-Council☆16Feb 20, 2026Updated last month
- Adds extensibility to Burp by using a list of payloads to pattern match on HTTP responses highlighting interesting and potentially vulner…☆15Aug 4, 2023Updated 2 years ago
- A network analysis tool that works together with snort to visually represent a PROFINET network graph.☆17May 17, 2016Updated 9 years ago
- ☆37Mar 2, 2026Updated 2 weeks ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆177Mar 1, 2026Updated 2 weeks ago
- ☆30Aug 2, 2025Updated 7 months ago
- Actionable data for Security Operations☆19Aug 26, 2021Updated 4 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- ☆13Jul 4, 2024Updated last year
- Evaluating and Reporting on Azure Active Directory/Active Directory Users Security Posture☆29May 8, 2019Updated 6 years ago
- ☆11Mar 16, 2023Updated 3 years ago
- OAuth 2.0 exploitation, attack and research tools.☆13Jan 20, 2024Updated 2 years ago
- A PowerShell-based script to analyze network logs from CSV files and detect potential beaconing behavior. Supports VirusTotal integration…☆17May 11, 2025Updated 10 months ago
- POC for DLL Proxying / Hijacking☆63May 26, 2025Updated 9 months ago
- ☆16Mar 2, 2023Updated 3 years ago
- ☆200Jul 30, 2024Updated last year
- Open source templates you can use to bootstrap your security programs☆894Dec 28, 2025Updated 2 months ago
- A catalog of services that can be publicly exposed within different cloud providers.☆14Aug 30, 2024Updated last year
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆16Sep 9, 2022Updated 3 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- Forensics artifacts collection☆21Jun 18, 2021Updated 4 years ago
- MITRE ATT&CK Based App in Power BI☆18Feb 23, 2024Updated 2 years ago
- NIST CyberSecurity Framework management tool☆167Nov 22, 2021Updated 4 years ago
- ☆19Dec 2, 2024Updated last year