Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard
☆90Dec 14, 2025Updated 4 months ago
Alternatives and similar repositories for Cybether
Users that are interested in Cybether are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive CRQ Monte Carlo simulation tool for quantifying cybersecurity risk using FAIR methodology. Built for EU SMBs, vCISOs, and sec…☆30Dec 5, 2025Updated 5 months ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆22May 27, 2025Updated 11 months ago
- ☆20Apr 10, 2025Updated last year
- Just-In-time Active Directory solution☆33Sep 3, 2025Updated 8 months ago
- compliance assessment and POA&M management for CMMC/NIST 800-171A☆112Jan 2, 2025Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository will be publicly available☆23Jan 27, 2026Updated 3 months ago
- CyberPreacher cloud project collection☆16Dec 21, 2025Updated 4 months ago
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 4 years ago
- Open source templates you can use to bootstrap your security programs☆901Dec 28, 2025Updated 4 months ago
- CriminalIP is a threat intelligence service that provides detailed information about IP addresses, domains, and other network elements.☆14Aug 20, 2024Updated last year
- List of open-source software from NIST☆16Jun 15, 2020Updated 5 years ago
- MCP Server for Wazuh SIEM☆202Dec 12, 2025Updated 4 months ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Feb 2, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- cloud.gov security policies and procedures☆27Mar 5, 2026Updated 2 months ago
- Mapping of open-source detection rules and atomic tests.☆209Feb 16, 2026Updated 2 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- A simple web app to get the latest EPSS data for a CVE ID☆12Dec 14, 2025Updated 4 months ago
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆4,005Updated this week
- A tool for fetching DFIR and other GitHub tools.☆27Aug 2, 2025Updated 9 months ago
- This project aims to bridge the gap between Microsoft Attack Surface Reduction (ASR) rules and MITRE ATT&CK by mapping ASR rules to their…☆29Nov 20, 2024Updated last year
- Cloud subdomains identification tool☆62Apr 15, 2025Updated last year
- The Clouditor is a tool to support continuous cloud assurance. Developed by Fraunhofer AISEC.☆87Apr 21, 2026Updated 2 weeks ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Publicly available scripts☆19Nov 18, 2025Updated 5 months ago
- Verizon Burp Extensions: AI Suite☆142Apr 22, 2025Updated last year
- ☆63Jun 3, 2025Updated 11 months ago
- A Secure Controls Framework (SCF) Power BI App☆26Nov 3, 2024Updated last year
- A PowerShell script to audit privileged users in Microsoft Entra ID and Azure with detailed reporting☆54Sep 29, 2025Updated 7 months ago
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆107Oct 13, 2025Updated 6 months ago
- putting all together: customer environment, some threats, azure security services, Microsoft 365 Defender services, Azure monitor service…☆17Apr 11, 2022Updated 4 years ago
- Incremental Machine Leaning by example - Detecting suspicious activity in real time with Zeek data streams, River and JA3 hashes☆17Aug 10, 2022Updated 3 years ago
- The vulnerability management guide should help to breakdown vulnerability management process into a manageable repeatable cycles tailored…☆16Jul 23, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Threat Simulator for Enterprise Networks☆14May 14, 2022Updated 3 years ago
- Show PIM role to solve a task - and group to activate the needed permission☆15May 22, 2025Updated 11 months ago
- Rustinel is an open-source endpoint detection runtime for Windows and Linux. It collects native telemetry from ETW and eBPF, normalizes e…☆134Apr 25, 2026Updated last week
- Azure and AWS Attacks☆1,119Nov 25, 2022Updated 3 years ago
- SATO is a PowerShell tool focuses on providing flexible, multi-grant type support for obtaining, managing, and analyzing Azure tokens.☆23Nov 24, 2025Updated 5 months ago
- FortiGate configuration analysis and transformation☆19Dec 22, 2025Updated 4 months ago
- Repository with all the MPARR components solution☆132Apr 9, 2026Updated 3 weeks ago