MCP server implementation for NIST Cybersecurity Framework 2.0
☆53Dec 6, 2025Updated 3 months ago
Alternatives and similar repositories for nist-csf-2-mcp-server
Users that are interested in nist-csf-2-mcp-server are comparing it to the libraries listed below
Sorting:
- Disclaimer: Please note that these materials are public available in several reference websites. These materials are not only the source …☆13Dec 31, 2023Updated 2 years ago
- IT Risk Management tools☆14Apr 4, 2025Updated 11 months ago
- ☆12Jun 9, 2021Updated 4 years ago
- An advanced AI-driven vulnerability scanner and penetration testing tool that integrates multiple AI providers (OpenAI, Grok, OLLAMA, Cla…☆34Nov 7, 2025Updated 4 months ago
- Security plugin for OpenClaw agents - prevents secret leaks, PII exposure, and destructive command execution☆48Feb 5, 2026Updated last month
- Conditional Access baseline for March 2025☆12Mar 4, 2025Updated last year
- CloudQuery Provider for Azure☆13Aug 15, 2022Updated 3 years ago
- This powerbi dashboards will help the Security team to analyze KBs, delivered monthly by Microsoft☆14Mar 9, 2022Updated 4 years ago
- This repository contains data related to coronavirus & COVID-19 based domains identified by Swimlane's DeepDive research team☆11Jul 6, 2020Updated 5 years ago
- SOAP is a free, online tool aimed at enabling civil society organisations and activist groups to build security policies that work for th…☆16Mar 23, 2024Updated last year
- LLM supported Toolkit for Blue Team/ SOC Operations☆47Jan 10, 2026Updated 2 months ago
- Various Malware-Related Utilities☆10Aug 4, 2016Updated 9 years ago
- An automation framework for deploying Microsoft Sentinel environments using pipelines. This project combines infrastructure-as-code (Bice…☆22Jul 31, 2025Updated 7 months ago
- An implementation of FortiGate Autoscale for the Microsoft Azure platform API with a Cosmos DB storage backend.☆13Jun 12, 2024Updated last year
- A modern approach to password rotation for the local administrator account on Windows 10 workstations utilizing Microsoft Endpoint Config…☆11May 5, 2020Updated 5 years ago
- An improvised Automated Threat Intelligent System with advanced vulnerability scanners and Opensource Intelligence Information gathering …☆10Jan 23, 2019Updated 7 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- List of open-source software from NIST☆16Jun 15, 2020Updated 5 years ago
- 🚨ATTENTION🚨 The VERIS mappings have migrated to the Center’s Mappings Explorer project. See README below. This repository is kept here …☆72Apr 3, 2024Updated last year
- Advanced kernel-native security framework to disrupt and prevent DNS-based breaches including C2 channels and tunneling with zero data lo…☆32Aug 30, 2025Updated 6 months ago
- Stop Microsoft 365 configuration drift before it becomes a breach☆61Feb 25, 2026Updated last week
- TN3270 MitM proxy and so much more☆14Jun 4, 2018Updated 7 years ago
- Comprehensive Cheat Sheet for Rapid7's Insight-IDR LEQL Search Language.☆11Mar 18, 2024Updated last year
- Incident Response Playbooks☆15Jun 10, 2019Updated 6 years ago
- ☆13Oct 16, 2024Updated last year
- ☆27Dec 6, 2013Updated 12 years ago
- Automated security investigation tool using Microsoft MCP Servers, GitHub Copilot, Python Modules and custom copilot-instructions.☆48Mar 2, 2026Updated last week
- Automatically deploy preconfigured SSL ready GoPhish instances into Azure using Terraform.☆16Apr 30, 2021Updated 4 years ago
- Automatic Microsoft Sentinel Deployment☆16Apr 1, 2025Updated 11 months ago
- Troubleshooting MDE Workstations☆42Jan 7, 2026Updated 2 months ago
- ☆14Jun 28, 2017Updated 8 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- Run individual configuration, compliance and security controls or full compliance benchmarks for CIS for Zoom using Powerpipe and Steampi…☆66Aug 14, 2025Updated 6 months ago
- Repository for all cbapi example scripts☆16Sep 18, 2018Updated 7 years ago
- ☆18Oct 16, 2025Updated 4 months ago
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- ML research on software vulnerabilities☆18Sep 8, 2019Updated 6 years ago
- Created by Ivan Quintanilla via the GitHub Connector☆20Feb 17, 2025Updated last year