intuitem / ciso-assistant-communityLinks
CISO Assistant is a one-stop-shop for GRC, covering Risk, AppSec, Compliance/Audit Management, Privacy and supporting +100 frameworks worldwide with auto-mapping: NIST CSF, ISO 27001, SOC2, CIS, PCI DSS, NIS2, CMMC, PSPF, GDPR, HIPAA, Essential Eight, NYDFS-500, DORA, NIST AI RMF, 800-53, CyFun, AirCyber, NCSC, ECC, SCF and so much more
☆3,360Updated this week
Alternatives and similar repositories for ciso-assistant-community
Users that are interested in ciso-assistant-community are comparing it to the libraries listed below
Sorting:
- Security compliance platform - SOC2, CMMC, ASVS, ISO27001, HIPAA, NIST CSF, NIST 800-53, CSC CIS 18, PCI DSS, SSF tracking☆621Updated 4 months ago
- All-in-one AI automation platform (workflows, agents, cases, tables) for security, IT, and infra teams.☆3,354Updated this week
- Open Adversarial Exposure Validation Platform☆1,435Updated this week
- Logging Made Easy (LME) is a no cost, open source platform that centralizes log collection, enhances threat detection, and enables real-t…☆1,143Updated last week
- Open source templates you can use to bootstrap your security programs☆879Updated 5 months ago
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,135Updated 3 weeks ago
- Six Degrees of Domain Admin☆2,539Updated this week
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,386Updated 4 months ago
- Curated list of resources for security Governance, Risk Management, Compliance and Audit professionals and enthusiasts (if they exist).☆933Updated 2 months ago
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,348Updated this week
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆305Updated 2 weeks ago
- Incident Response Methodologies 2022☆1,082Updated 7 months ago
- Useful templates and working document for implementing ISO 27001 - ISMS☆190Updated 6 months ago
- A modular vulnerability scanner with automatic report generation capabilities.☆969Updated last week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆679Updated last month
- An offensive security toolset for Microsoft 365 focused on Microsoft Copilot, Copilot Studio and Power Platform☆1,074Updated 2 weeks ago
- A web application that assists network defenders, analysts, and researchers in the process of mapping adversary behaviors to the MITRE AT…☆1,203Updated last month
- Collaborative Incident Response platform☆1,307Updated this week
- Shuffle: A general purpose security automation platform. Our focus is on collaboration and resource sharing.☆2,104Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,192Updated last week
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,180Updated this week
- Open Cyber Threat Intelligence Platform☆7,947Updated this week
- Microsoft Security Copilot is a generative AI-powered security solution that helps increase the efficiency and capabilities of defenders …☆584Updated 2 months ago
- A scalable file analysis and data generation platform that allows users to easily orchestrate arbitrary docker/vm/shell tools at scale.☆960Updated last week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,008Updated 7 months ago
- A collection of sources of documentation, as well as field best practices, to build/run a SOC☆1,552Updated 2 weeks ago
- SOCFortress CoPilot☆397Updated this week
- Monkey365 provides a tool for security consultants to easily conduct not only Microsoft 365, but also Azure subscriptions and Microsoft E…☆1,209Updated 2 months ago
- secator - the pentester's swiss knife☆1,161Updated this week
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,086Updated 4 months ago