A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program
☆47Feb 2, 2026Updated 2 months ago
Alternatives and similar repositories for orgsec-guide
Users that are interested in orgsec-guide are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆36Apr 29, 2025Updated 11 months ago
- This Terraform module consists of the configuration for automating the remediation of AWS EC2 vulnerabilities using AWS Inspector finding…☆50Jul 4, 2025Updated 9 months ago
- AWS Trustline: Check external access on your AWS account☆129Feb 27, 2026Updated last month
- ☆46Nov 7, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- ☆18Feb 2, 2026Updated 2 months ago
- Performs review of Entra ID users and their assigned roles based on least privilege principle and actual Entra ID operations performed wi…☆32Feb 23, 2026Updated last month
- This is a companion to the Security Engineer Questions☆203Nov 27, 2023Updated 2 years ago
- ☆14Jan 8, 2026Updated 3 months ago
- ☆12Jun 17, 2024Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Feb 16, 2025Updated last year
- kntrl is an eBPF based runtime agent that monitors and prevents anomalous behaviour defined by you on your pipeline. kntrl achieves this …☆127Apr 1, 2026Updated last week
- Scan your dev machine for AI agents, MCP servers, IDE extensions, and suspicious packages - in seconds.☆89Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆23Mar 4, 2025Updated last year
- ☆29Dec 26, 2025Updated 3 months ago
- Infrastructure-as-code for a serverless knowledge base using Amazon Bedrock, Aurora PostgreSQL (with pgvector), Lambda, and S3. This setu…☆19Mar 23, 2025Updated last year
- This is a sample solution that demonstrates how to use AWS IAM Identity Center with Neptune to visualize and map relationships between id…☆34Nov 27, 2025Updated 4 months ago
- Data about all known supply-chain attacks through history☆65May 28, 2025Updated 10 months ago
- Public scripts used to install the Vanta agent☆15Feb 17, 2026Updated last month
- Content-Security-Policy report aggregator/analyzer☆54May 29, 2020Updated 5 years ago
- Awesome AWS service control policies (SCPs), Resource Control Policies (RCPs), and other organizational policies☆32Nov 26, 2025Updated 4 months ago
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆101Apr 7, 2026Updated last week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Open source templates you can use to bootstrap your security programs☆899Dec 28, 2025Updated 3 months ago
- The Marinus NodeJS UI and the supporting Python analysis scripts.☆61Mar 10, 2026Updated last month
- The Vanta Control Set maps common compliance standards from their requirements to controls and provides them in an easy to consume machin…☆19Aug 26, 2021Updated 4 years ago
- A Model Context Protocol server that connects AI assistants like Claude to AWS security services, allowing them to autonomously query, in…☆82Jul 25, 2025Updated 8 months ago
- Trust Dexter to ensure that all your images are pinned by digest for better security☆31Nov 8, 2023Updated 2 years ago
- Mirror of cisa.gov/kev data files☆76Updated this week
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆67Apr 11, 2023Updated 3 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ☆69Jul 18, 2025Updated 8 months ago
- Your Everyday Threat Intelligence☆22Mar 21, 2017Updated 9 years ago
- Gram is Klarna's own threat model diagramming tool☆332Updated this week
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆138Jan 28, 2026Updated 2 months ago