Security Tools
A collection of interactive security and risk management tools — assessments, frameworks, visualisations and references. All tools run entirely in-browser, no data is sent or stored externally.
Incident Readiness
3 tools
Incident Readiness · Full Suite
v3.0
Latest
Cyber Incident Readiness Assessment (CIRA)
Comprehensive incident readiness platform. Tiered assessment across 8 domains and 40 controls with sector overlays for 10 regulated industries, threat profiling, live maturity radar with peer benchmarking, evidence status tracking, improvement plan with owner and due date fields, retest tracking, 8 tabletop exercise scenarios with inject-based facilitation, AI-assisted gap narrative, and full PDF report generation. Saves and loads state in-browser.
40
Controls
8
Domains
10
Sectors
8
Tabletops
AI
Narrative
PDF
Export
Open tool →
Incident Triage
v1.0
New
Cyber Incident Decision Tree
Step-by-step triage tool for active cyber incidents. Determines severity (P0–P4), when to assemble an IMT, when to engage external DFIR, and who to notify. Every decision point includes an "unknown" path for honest triage under uncertainty. Actionable initial steps sized for large enterprise environments.
Open tool →
Incident Management
Cyber Incident Lifecycle
Visual guide to the cyber incident lifecycle phases — from initial detection through containment, eradication, recovery and lessons learned. Reference tool for incident responders and SOC teams.
Open tool →
Frameworks & Assessment
5 tools
Framework Assessment
v2.0
NCSC CAF v4.0 Assessment Tool
Full interactive assessment tool covering all 41 Contributing Outcomes across 4 objectives and 14 principles of the NCSC Cyber Assessment Framework v4.0 (August 2025). Includes risk matrix, improvement plan, maturity radar and exportable report.
Open tool →
Maturity Assessment
Cyber Maturity Mapper
Map and visualise your organisation's cyber security maturity across key capability domains. Score capabilities against a defined maturity model to identify gaps, track improvement over time and produce a prioritised development roadmap.
Open tool →
Control Assessment
Control Effectiveness Matrix
Assess and visualise the effectiveness of security controls mapped across threat categories. Rate controls by coverage and effectiveness to identify gaps and optimise your defensive posture.
Open tool →
Security Classification
CSR Tiers
Interactive reference tool for Cyber Security Requirements tiering. Classify organisations or systems by tier based on criticality, data sensitivity and threat exposure, with mapped control expectations per tier.
Open tool →
IR Maturity Assessment
v1.0
CREST CISR Maturity Assessment
Structured evaluation tool based on the CREST Cyber Incident Simulation Review (CISR) maturity model. Assesses IR capability across 8 domains — Governance, Detection & Alerting, IR Capability, Regulatory Reporting, People & Skills, Technical Tooling, Recovery & BCP, and Continuous Improvement. Scored 0–4 per question with evidence prompts, per-domain radar, and auto-generated engagement timeline, budget band and resourcing plan.
8
Domains
0–4
Maturity
IR
Roadmap
£
Budget Band
Open tool →
Risk & Threat Intelligence
4 tools
Risk Management
Cyber Risk Matrix
Interactive cyber risk matrix for plotting and managing risks by likelihood and impact. Supports custom risk entries, risk scoring, and visual risk appetite overlay to prioritise treatment decisions.
Open tool →
Threat Intelligence
Threat Actor Profiles
Reference profiles for key threat actor groups — covering motivations, typical TTPs, targeted sectors and geographic focus. Useful for threat modelling, risk assessments and briefing stakeholders.
Open tool →
Threat Intelligence
TI Workflow & Dissemination
End-to-end threat intelligence workflow covering the full intelligence lifecycle — from requirements and collection through processing, analysis, dissemination and feedback. Covers CVE/zero-day prioritisation, infrastructure intelligence, email security (DMARC/DKIM/SPF), credential exposure, TLP framework, STIX/TAXII, and feed targets across SIEM, EDR, firewall, vuln management and executive briefing.
Open tool →
Threat Intelligence · Reference
CTI Reference Guide
Comprehensive cyber threat intelligence reference covering the full intelligence lifecycle, source taxonomy, intelligence types beyond IOCs, DMARC/DKIM/SPF email security intelligence, TLP framework, STIX 2.1 / TAXII 2.1 structured sharing, and dissemination targets. Reference companion to the TI Workflow tool.
Open tool →
Compliance & Regulation
1 tool
Operations & Tooling
3 tools
DFIR · Forensics
DFIR Dashboard
Browser-based Digital Forensics and Incident Response analysis dashboard. Upload and parse triage artefacts, visualise event timelines, surface ransomware and threat indicators, and track investigation findings — all client-side with no data leaving the browser.
Open tool →
DFIR · Forensics
v1.0
New
Windows DFIR Investigation Walkthrough
Step-by-step investigation checklist for Windows endpoints in a networked environment. Covers 8 investigation phases: scoping & initial response, log source collection (Windows event logs, Sysmon, EDR, network, cloud), key event ID reference, filesystem artefacts (MFT, USN Journal, Prefetch, AmCache, Shellbags), registry forensics, memory forensics (Volatility 3 workflow), network forensics, and threat actor TTPs & LOLBin abuse. Includes per-item notes, progress tracking, and report export.
8
Phases
80+
Checks
MFT
USN · Reg
TTPs
LOLBins
Open tool →
Client Services
Mock Client Portal
Demonstration client portal for managed security services — showcasing how security findings, incident updates, reports and risk posture can be presented to clients in a clean, professional interface.
Open tool →
Reference Documents
2 docs
DFIR · Forensics
.docx
DFIR Workflow — End-to-End Investigation Framework
Comprehensive Word document covering the full DFIR investigation lifecycle across 10 sections: governance & audit framework, preservation order of volatility, Windows endpoint collection, network & perimeter sources, cloud collection (AWS / Azure / GCP), investigation objectives, analysis workflow, reporting, recommendations, and post-incident review.
Download ↓
Incident Response
.docx
IR Playbook Suite — 5 Scenario Playbooks
Five fully structured incident response playbooks covering: Ransomware (Enterprise-Wide), Supply Chain Compromise (Software/MSP), Insider Threat (Privileged Exfiltration), Nation-State (Persistent Intrusion), and OT/ICS Attack (Operational Disruption). Each playbook includes RACI matrix, phase-by-phase step tables, decision callout boxes, pre-action checklists, and multi-jurisdiction compliance notes.
Download ↓