An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
☆127Jul 14, 2024Updated last year
Alternatives and similar repositories for NIST-to-Tech
Users that are interested in NIST-to-Tech are comparing it to the libraries listed below
Sorting:
- Technical cyber security resources across the NIST cyber security framework lifecycle☆11Apr 28, 2021Updated 4 years ago
- A pre-DDoS security assessment tool☆119Jun 11, 2021Updated 4 years ago
- Offensive Terraform Website☆45Oct 8, 2020Updated 5 years ago
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- GRC (Governance, Risk and Compliance) Software, to manage risks and controls. It is based in best practices and helps organizations to ma…☆27Mar 8, 2023Updated 3 years ago
- Azure Deployment Templates for Mandiant Managed Huning☆12Jun 1, 2023Updated 2 years ago
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆20Mar 24, 2022Updated 3 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆22May 4, 2023Updated 2 years ago
- ☆121Jan 29, 2026Updated last month
- ☆28Oct 2, 2025Updated 5 months ago
- ☆10May 12, 2022Updated 3 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- A curated list of Awesome Security Challenges.☆211Nov 6, 2024Updated last year
- External monitoring for organization assets☆420Jun 5, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆30Jan 12, 2023Updated 3 years ago
- Provides an overview of the inner file structure of a PDF☆24Sep 26, 2022Updated 3 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Mar 31, 2024Updated last year
- Open Cloud Security Posture Management Engine☆344Feb 19, 2022Updated 4 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Feb 11, 2021Updated 5 years ago
- ☆14Jan 8, 2026Updated 2 months ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆19Feb 29, 2024Updated 2 years ago
- Offensive Terraform module which creates an IAM role with trust relationship with attacker's AWS account and attaches managed IAM Policy …☆12Sep 18, 2020Updated 5 years ago
- Cross-browser cryptographic library implementing the Web Cryptography API.☆14Aug 15, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆49Nov 11, 2022Updated 3 years ago
- ☆29Jan 31, 2025Updated last year
- ☆89Feb 11, 2022Updated 4 years ago
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Sep 2, 2021Updated 4 years ago
- HECTOR☆20Mar 3, 2017Updated 9 years ago
- Send events from G Suite to McAfee SIEM☆13Aug 23, 2019Updated 6 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- Stats about HTTP response security headers usage mentioned by the OSHP.☆17Jan 25, 2026Updated last month
- Python wrapper for the Mitre ATT&CK framework API☆31Mar 12, 2018Updated 7 years ago
- Visualize your Terraform files☆34Sep 9, 2020Updated 5 years ago
- automatically detect software supply chain smells and issues http://arxiv.org/pdf/2410.16049☆18Mar 1, 2026Updated last week
- Threat Detection System using Hybrid (Machine Learning + Lexical Analysis) learning Approach.☆11May 30, 2017Updated 8 years ago
- Development repository for the snort cookbook☆27Mar 2, 2026Updated last week
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Jun 12, 2022Updated 3 years ago