Open source templates you can use to bootstrap your security programs
☆897Dec 28, 2025Updated 3 months ago
Alternatives and similar repositories for sectemplates
Users that are interested in sectemplates are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆578Feb 12, 2026Updated last month
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Mapping of open-source detection rules and atomic tests.☆204Feb 16, 2026Updated last month
- ☆192Apr 16, 2025Updated 11 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Detection Engineering is a tactical function of a cybersecurity defense program that involves the design, implementation, and operation o…☆1,162Apr 1, 2026Updated last week
- Enriching the NVD CVSS scores to include Temporal & Threat Metrics☆222Updated this week
- AttackGen is a cybersecurity incident response testing tool that leverages the power of large language models and the comprehensive MITRE…☆1,218Dec 29, 2025Updated 3 months ago
- Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threa…☆1,413Jun 24, 2025Updated 9 months ago
- A resource containing all the tools each ransomware gangs uses☆1,343Apr 1, 2026Updated last week
- A powerful tool that leverages AI to automatically generate comprehensive security documentation for your projects☆105Oct 13, 2025Updated 5 months ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆147Jun 18, 2024Updated last year
- Generate a matrix based on an inventory of InfoSec tools☆24Jul 4, 2024Updated last year
- Save toil in security operations with: Detection & Intelligence Analysis for New Alerts (D.I.A.N.A. )☆223Sep 4, 2024Updated last year
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- An AI-powered threat modeling tool that leverages OpenAI's GPT models to generate threat models for a given application based on the STRI…☆1,000Mar 2, 2026Updated last month
- A comprehensive checklist and guide for organizations looking to implement a robust cybersecurity program☆47Feb 2, 2026Updated 2 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆341Apr 3, 2026Updated last week
- Halberd : Multi-Cloud Agentic Attack Tool☆335Updated this week
- AWS honey token manager☆90Aug 1, 2024Updated last year
- Gram is Klarna's own threat model diagramming tool☆332Mar 30, 2026Updated last week
- Repository containing source code of MixewayFlow service that is Swiss army knife for DevSecOps Teams☆80Mar 30, 2026Updated last week
- Incident Response Methodologies 2022☆1,113Apr 11, 2025Updated last year
- CISO Assistant is a one-stop-shop GRC platform for Risk Management, AppSec, Compliance & Audit, TPRM, Privacy, and Reporting. It supports…☆3,941Updated this week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Cybether - A modern, open-source Cybersecurity Governance, Risk, and Compliance (GRC) dashboard☆89Dec 14, 2025Updated 3 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,289Apr 2, 2026Updated last week
- Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by devel…☆726Nov 14, 2025Updated 4 months ago
- Open-source security automation platform for teams and AI agents☆3,544Updated this week
- Automated web vulnerability scanning with LLM agents☆459Jun 18, 2025Updated 9 months ago
- Playbooks for SOC Analysts☆695Dec 11, 2022Updated 3 years ago
- Automation to assess the state of your M365 tenant against CISA's baselines☆2,522Updated this week
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆85Updated this week
- Web Server Vulnerability Scanning Tool☆36Mar 11, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Awesome secure by default libraries to help you eliminate bug classes!☆702Dec 6, 2025Updated 4 months ago
- A comprehensive framework for analyzing and defending against attacks targeting Software Development Life Cycle Infrastructure.☆140Updated this week
- Live validation proxy tool for testing web app vulnerabilities☆844Mar 24, 2026Updated 2 weeks ago
- Open Adversarial Exposure Validation Platform☆1,655Updated this week
- Detect Tactics, Techniques & Combat Threats☆2,275Jan 21, 2026Updated 2 months ago
- IntelOwl: manage your Threat Intelligence at scale☆4,534Updated this week
- A public collection of detections designed to detect threats associated with the Okta WIC Platform.☆23Mar 26, 2026Updated 2 weeks ago