oruinfosec / SecurityPolicyGeneratorLinks
Generate security policies and documents based on KPNs templates.
☆38Updated 5 years ago
Alternatives and similar repositories for SecurityPolicyGenerator
Users that are interested in SecurityPolicyGenerator are comparing it to the libraries listed below
Sorting:
- ☆46Updated 2 years ago
- SANS has developed a set of information security policy templates. These are free to use and fully customizable to your company's IT secu…☆42Updated 3 years ago
- Sharing Threat Hunting runbooks☆26Updated 6 years ago
- ☆119Updated last year
- Workflows for Shuffle☆23Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆44Updated last year
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆79Updated this week
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆119Updated last year
- Incident Response Playbooks☆14Updated 6 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆23Updated 5 months ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆14Updated 5 years ago
- ☆17Updated 2 years ago
- ☆54Updated 4 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Updated 8 months ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Scripts to help work with configuration audit files☆86Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Collection of useful Canary tools☆82Updated 3 weeks ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 6 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆103Updated 2 weeks ago
- Recon Hunt Queries☆77Updated 4 years ago
- ☆64Updated 4 months ago
- A small set of scripts to summarize AWS Security Groups, and generate visualizations of the rules.☆63Updated 5 years ago
- Tools for AWS forensics☆63Updated 9 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago