Continuous Threat Exposure Management Maturity Model (CTEMMM)
☆29Feb 6, 2026Updated last month
Alternatives and similar repositories for CTEMMM
Users that are interested in CTEMMM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆40Nov 14, 2025Updated 4 months ago
- A scalable solution for managing and brokering user access to Linux virtual machines via Azure Virtual Desktop (AVD).☆17Jul 31, 2025Updated 7 months ago
- A collection of cybersecurity challenges from the CTF Wastelands organized by Interlogica, featuring Docker-based deployment and comprehe…☆13Jul 12, 2024Updated last year
- A massive collection of Cybersecurity papers, guides and reports.☆10Jan 3, 2025Updated last year
- ☆65Updated this week
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Open FAIR Course☆13Feb 4, 2020Updated 6 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆29Apr 10, 2024Updated last year
- ☆15Mar 12, 2025Updated last year
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- ☆21Nov 19, 2025Updated 4 months ago
- ☆10Dec 28, 2015Updated 10 years ago
- Guidance for Organization on AWS☆12Nov 26, 2025Updated 3 months ago
- ☆13Nov 5, 2024Updated last year
- ☆16Sep 12, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Did someone say types?☆13Sep 5, 2016Updated 9 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Aug 8, 2020Updated 5 years ago
- I’ve built a collection of PowerShell scripts for managing, reporting, and auditing Microsoft 365 environments (BETA).☆68Jan 28, 2026Updated last month
- ☆30Aug 2, 2025Updated 7 months ago
- Repository for different Windows DFIR related CMDs, PowerShell CMDlets, etc, plus workshops that I did for different conferences or event…☆77Jul 13, 2021Updated 4 years ago
- The SonarQube plugin for jQAssistant☆15Mar 13, 2026Updated last week
- Installer for OpenTAKServer☆44Mar 12, 2026Updated last week
- CSIRT Jump Bag☆27Apr 25, 2024Updated last year
- AWS Signer Plugin for Notation☆18Mar 16, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- A series of python scripts to extract information from Dark Web Applications☆14Mar 26, 2025Updated 11 months ago
- Stakeholder analysis for business project management☆20Apr 14, 2025Updated 11 months ago
- Generate Indexes from SANS PDFs☆18Jun 3, 2024Updated last year
- MineMeld nodes for MISP☆19Jan 23, 2024Updated 2 years ago
- ☆13Aug 18, 2016Updated 9 years ago
- Certipy in Docker☆13Mar 28, 2024Updated last year
- Parsing MITRE EDR Evaluation results☆12Dec 5, 2018Updated 7 years ago
- VTC - Velociraptor Timeline Creator☆19May 15, 2024Updated last year
- HackAgent is an open-source security toolkit to detect vulnerabilities of your AI Agents☆38Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- QRadar AQL backend for converting Sigma rules to QRadar AQL queries☆14Sep 18, 2025Updated 6 months ago
- Automated activity logging utility for Mythic C2 v3.0+ with Ghostwriter v3.0+☆23Jul 31, 2025Updated 7 months ago
- Experimental: Windows .text section compare - disk versus memory☆15Jan 21, 2015Updated 11 years ago
- GitHub Action to approve pull requests securely☆12Updated this week
- 🔑🔐☁️ Cloudformation custom resource that enables creation of KMS encrypted strings and SSM secure parameters☆13Jul 9, 2020Updated 5 years ago
- P2P Communications of Named Pipes☆12Dec 11, 2025Updated 3 months ago
- Opengraph-Compatible JSON Generator for BloodHound☆27Jan 12, 2026Updated 2 months ago