A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.
☆26Oct 3, 2024Updated last year
Alternatives and similar repositories for cybersecurity-models
Users that are interested in cybersecurity-models are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automate vulnerability triage which prioritizes remediation over discovery☆20Updated this week
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 11 months ago
- ☆28Sep 4, 2024Updated last year
- ☆37Apr 9, 2025Updated 11 months ago
- ☆18Jul 30, 2024Updated last year
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15May 23, 2017Updated 8 years ago
- A script that will generate a fine-tuning file for openai's fine-tuning feature☆17Dec 23, 2023Updated 2 years ago
- Solve problems of device identity, certificates and the keychain.☆13Jan 3, 2019Updated 7 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 11 months ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- ☆65May 21, 2024Updated last year
- A Python tool to manage GitHub Organizations and perform backup☆21Jan 6, 2026Updated 2 months ago
- ☆23Feb 20, 2023Updated 3 years ago
- ☆10Jul 1, 2023Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Mar 11, 2026Updated last week
- A proxy to fan out a single request to multiple prometheus servers and merge the responses☆12Feb 22, 2019Updated 7 years ago
- Go code generators for the Apple Device Management schema data☆11Jul 14, 2023Updated 2 years ago
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆109Dec 3, 2025Updated 3 months ago
- Useful scripts for maintaining multiple AWS Accounts☆45Dec 1, 2025Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Service to monitor one or more vmx path[s] and restart the vmx[s] if necessary☆11Mar 2, 2022Updated 4 years ago
- ☆20Jul 16, 2025Updated 8 months ago
- ☆26Apr 1, 2022Updated 3 years ago
- Detect common classes of XPC exploits☆16Updated this week
- Use Munki to enable Touch ID for sudo☆12Jun 14, 2020Updated 5 years ago
- A MacAdmin-focused QuickLook plugin with GitOps in mind☆85Updated this week
- open source malware analysis and research notes dump☆26Aug 30, 2023Updated 2 years ago
- macOS application that makes use of the EndpointSecurity framework☆19Aug 1, 2019Updated 6 years ago
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆15Jun 7, 2024Updated last year
- Material for the 2024 MacAdmins Conference GitOps workshop☆14Sep 2, 2024Updated last year
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last month
- Security Compliance Project for Linux☆20Sep 25, 2025Updated 5 months ago
- A house for your mouse so you always know where it's at☆21Dec 2, 2025Updated 3 months ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- just here for reference.☆17Feb 26, 2018Updated 8 years ago
- Case, knowledge management and digital investigation platform☆32Feb 26, 2026Updated 3 weeks ago
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 10 months ago
- ☆12Apr 20, 2025Updated 11 months ago