Incident Response Playbook Bundle
6 incident-specific playbooks with IR policy, communication templates, and severity matrix
CSfC CM β Complete Compliance Bundle
118 ElastAlert2 rules + 5 GRC docs β complete CSfC CM Annex V1.0 compliance toolkit
CSfC CM β Universal Core Alert Rules
67 ElastAlert2 rules for CSfC CM-SM, MP6 & MP7 β mandatory for every CSfC deployment
Rust Memory-Safe Security Tools
Five Rust memory-safe security tools with compliance mappings to OWASP, CWE Top 25, NIST, ISO 27001, and CIS Controls.
Rust Network Protocol Analyzer
Five Rust network protocol analysis tools with compliance mappings to NIST, ISO 27001, CIS Controls, and MITRE ATT&CK.
Java Enterprise Security Audit Tools
Five Java security audit tools: SecurityAuditor, ConfigChecker, AccessReviewer, LogAnalyzer, SecurityReport. CIS v8, ISO A.8.8, NIST CA-7, MITRE ATT&CK. JDK 17 stdlib only.
Java SIEM Integration Library
Five Java SIEM tools: SIEMConnector, EventForwarder, LogNormalizer, AlertCorrelator, SIEMReport. ISO A.8.15, CIS v8 8.2, NIST AU-9, MITRE T1070. JDK 17 stdlib only.
Go API Security Testing Tools
Go Log Analysis and Parsing Tools
CYB-106 Go Network Security Scanner
Five Go-based network security scanners (port scan, service fingerprint, TLS audit, host discovery, security report) with CIS v8, ISO A.8.20, NIST CA-7, and MITRE T1046 alignment.
Ruby Web Application Security Scripts
Ruby web application security scripts aligned with OWASP Top 10, CIS v8 Section 16, ISO A.8.29, and NIST SA-11.
Ruby Penetration Testing Scripts
Ruby penetration testing scripts aligned with PTES, OWASP, ISO A.8.29, CIS v8 Section 18, and NIST SP 800-115.
CYB-105 Security Tool Evaluation Matrix
Weighted evaluation matrix for comparing security tools across 8 categories with ISO A.8.8, CIS v8, and NIST SP 800-53 SA-9 alignment.
Cybersecurity Programme Metrics Dashboard
Cyber Crisis Communication Toolkit
SOAR Playbook Templates
Service Account Management Procedure
Multi-Factor Authentication Rollout Toolkit
Access Certification Workbook
Privileged Access Management Policy and Procedure
Identity and Access Management Toolkit
Cyber Resilience Scorecard
Security Operations Monthly Report Template
Cyber Insurance Questionnaire Prep Kit
Board Cyber Risk Report Template
Board cyber risk report with risk register, heat map, trend dashboard, and SEC disclosure alignment. ISO A.5.1, CIS v8 17, NIST PM-9.
STRIDE Threat Modelling Workbook
STRIDE threat modelling with MITRE ATT&CK mapping, risk matrix, and mitigation tracking.
Data Flow Diagram Templates Security
Zero Trust Network Design Toolkit
Security Architecture Review Template
Active Directory Hardening Checklist
Microsoft 365 Security Configuration Baseline
Network Device Hardening Checklist
macOS Hardening Checklist
CIS macOS Sonoma hardening checklist with Jamf MDM profiles, Tenable scanning, and SIEM integration.
Linux RHEL Ubuntu Hardening Checklist
Windows 11 Endpoint Hardening Checklist
Windows 11 hardening checklist with 27 CIS Benchmark v3.0 controls, registry/GPO paths, compliance tracking, and summary dashboard.
Windows Server Hardening Checklist CIS L1 L2
CYB-078 Cloud Security Posture Review Workbook
Kubernetes Security Hardening Toolkit
GCP Security Baseline Toolkit
Azure Security Baseline Toolkit
AWS Security Baseline Toolkit
Bug Bounty Programme Template
Red Team Exercise Toolkit
Pentest Report Template
Penetration Testing Scope and Rules of Engagement
Vulnerability Management Programme Toolkit
DDoS Response Playbook
Insider Threat Response Playbook
Data Breach Response Playbook
Phishing Incident Response Playbook
Ransomware Response Playbook
Incident Response Plan Technical
SOC Metrics and KPI Dashboard
SOC Analyst Runbook Library
Threat Hunting β Hypothesis Workbook
Threat Hunting Playbook Library
Bash β Container Security Audit Scripts
Bash β Firewall and Network Security Scripts
Bash β Log Forwarding and SIEM Integration
Bash β Linux Incident Response Triage Kit
Bash β Linux Server Hardening Scripts
Python β API Security Testing Scripts
Python β File and Hash Analysis Toolkit
Python β Phishing Detection Scripts
Python β Vulnerability Management Automation
Python β AWS Security Audit Scripts
Python β Threat Intelligence Automation
Python β Log Analysis and Anomaly Detection
Python β OSINT Automation Scripts
Python β Network Reconnaissance Toolkit
PowerShell β CIS Controls Compliance Checker
PowerShell β Malware Hunting Scripts
PowerShell β Log Collection and Forwarding
PowerShell β Microsoft 365 Security Audit
PowerShell β Azure Security Audit Scripts
PowerShell β Vulnerability Scan Automation
PowerShell β Incident Response Collection Kit
PowerShell β Windows Hardening Scripts
PowerShell β Active Directory Security Toolkit
Sigma Rules β Full MITRE ATT&CK Coverage
Sigma Rules Pack β Cloud Attacks
Sigma Rules Pack β Web Application Attacks
6 Sigma detection rules for web application attacks mapped to MITRE T1190, T1059.007, CIS v8 Β§16, ISO A.8.29, NIST SI-10
Sigma Rules Pack β Linux Threats
10 Sigma detection rules for Linux threats mapped to MITRE ATT&CK v14, CIS v8 Β§10, ISO A.8.8, NIST SI-4
Sigma Rules Pack β Windows Threats
10 Sigma detection rules for Windows threats mapped to MITRE ATT&CK v14, CIS v8 Β§10, ISO A.8.8, NIST SI-4
Elastic β Threat Intelligence Integration Pack
Elastic β Cloud Monitoring Rules AWS GCP
Elastic β MITRE ATT&CK Rule Pack
20 NDJSON rule files + MITRE Coverage Matrix XLSX covering all 14 ATT&CK tactics
Elastic β Endpoint Threat Detection Rules
6 NDJSON endpoint detection rules mapped to MITRE T1059/T1055/T1547, CIS v8, ISO A.8.8, NIST SI-3
Elastic β Active Directory Threat Detection
6 NDJSON AD threat detection rules mapped to MITRE T1558/T1078/T1087, CIS v8, ISO A.5.15, NIST AC-2
Elastic SIEM Detection Rules Pack
10 NDJSON detection rule files mapped to MITRE ATT&CK v14, CIS v8, ISO A.5.7, NIST IR-4
KQL β Network and Firewall Anomaly Detection
KQL β Windows Security Event Detection
KQL β Sentinel Workbook Templates
KQL β MITRE ATT&CK Coverage Pack
KQL β Cloud Resource Abuse Detection
KQL β Office 365 Threat Detection
KQL β Insider Threat Detection Pack
KQL β Ransomware Detection and Response
KQL β Microsoft Defender Threat Hunting
KQL β Azure AD Entra ID Attack Detection
KQL Detection Pack β Microsoft Sentinel
Splunk SPL β Compliance Reporting Queries
Splunk SPL β Web Application Attack Detection
Splunk SPL β Privileged Account Monitoring
Splunk SPL β MITRE ATT&CK Coverage Pack
Splunk SPL β Phishing and Email Threat Queries
Splunk SPL β Endpoint Detection Queries
Splunk SPL β Network Anomaly Detection
Splunk SPL β Cloud Azure Threat Detection
Splunk SPL β Cloud AWS Threat Detection
Splunk SPL β Insider Threat Detection Pack
Splunk SPL β Ransomware Detection Queries
Splunk SPL β Active Directory Attack Detection
Splunk SPL Detection Pack β Threat Hunting
Security Architecture Templates
Security architecture diagrams and hardening guides