A collection of models for organizing, prioritizing, and understanding cybersecurity and information risk management concepts.
☆25Oct 3, 2024Updated last year
Alternatives and similar repositories for cybersecurity-models
Users that are interested in cybersecurity-models are comparing it to the libraries listed below
Sorting:
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆15Apr 10, 2025Updated 10 months ago
- ☆18Jul 30, 2024Updated last year
- Automate vulnerability triage which prioritizes remediation over discovery☆20Jan 19, 2026Updated last month
- A meta-database collecting resources that compile lists of breaches☆21Oct 30, 2025Updated 4 months ago
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated 2 weeks ago
- ☆28Sep 4, 2024Updated last year
- ☆23May 22, 2023Updated 2 years ago
- An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and secur…☆174Feb 22, 2026Updated last week
- OpenID Shared Signals and Events (SSE) / Continuous Access Evaluation Protocol (CAEP) / Risk Incident Sharing and Coordination (RISC) JSO…☆14Jun 7, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆31Oct 28, 2024Updated last year
- ☆37Apr 9, 2025Updated 10 months ago
- ☆65May 21, 2024Updated last year
- A Golang program to rotate AWS & GCP account keys☆67May 12, 2025Updated 9 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated 3 weeks ago
- Open Authorization API (OAA) development libraries, connectors and resources.☆17Jan 9, 2025Updated last year
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Spotter is a comprehensive Kubernetes security scanner that uses CEL-based rules to identify security vulnerabilities, misconfigurations,…☆71Sep 13, 2025Updated 5 months ago
- This service provides authenticated access to a static website hosted in an s3 bucket.☆33Feb 25, 2023Updated 3 years ago
- Ansible-based deployment automation for the OpenConext platform☆14Updated this week
- A powerful hardware ID spoofing tool designed to modify system identifiers for privacy and security purposes. Change MAC addresses, HWID,…☆22Updated this week
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 10 months ago
- ☆11Aug 31, 2019Updated 6 years ago
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Sep 19, 2023Updated 2 years ago
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆46Feb 2, 2026Updated last month
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 7 months ago
- A specification for DID create/update/deactivate operations.☆11Jan 3, 2025Updated last year
- ☆22Nov 22, 2025Updated 3 months ago
- Modern partition manager for PostgreSQL☆17May 18, 2023Updated 2 years ago
- Getting started guides to deploy the SIGHUP Distribution (SD) in different environments☆15Updated this week
- ☆16Nov 13, 2023Updated 2 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Feb 20, 2026Updated last week
- ☆12Jun 17, 2024Updated last year
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.