Security Tools

A collection of interactive security and risk management tools — assessments, frameworks, visualisations and references. All tools run entirely in-browser, no data is sent or stored externally.

Created with Claude.ai · github.com/danhowett/General · 16 tools
Proof of concept only. These tools are provided for exploratory and educational purposes. They are not professional security assessments and results should not be relied upon for compliance, audit, or risk management decisions. Use at your own risk.
Incident Readiness
3 tools
Frameworks & Assessment
5 tools
Framework Assessment
v2.0
NCSC CAF v4.0 Assessment Tool
Full interactive assessment tool covering all 41 Contributing Outcomes across 4 objectives and 14 principles of the NCSC Cyber Assessment Framework v4.0 (August 2025). Includes risk matrix, improvement plan, maturity radar and exportable report.
CAF v4.0NCSC41 COsRisk MatrixCNIRadar Chart
Open tool →
Maturity Assessment
Cyber Maturity Mapper
Map and visualise your organisation's cyber security maturity across key capability domains. Score capabilities against a defined maturity model to identify gaps, track improvement over time and produce a prioritised development roadmap.
Maturity ModelCapability MappingGap AnalysisRoadmap
Open tool →
Control Assessment
Control Effectiveness Matrix
Assess and visualise the effectiveness of security controls mapped across threat categories. Rate controls by coverage and effectiveness to identify gaps and optimise your defensive posture.
ControlsEffectivenessGap AnalysisThreat Mapping
Open tool →
Security Classification
CSR Tiers
Interactive reference tool for Cyber Security Requirements tiering. Classify organisations or systems by tier based on criticality, data sensitivity and threat exposure, with mapped control expectations per tier.
CSRTieringClassificationControl Mapping
Open tool →
IR Maturity Assessment
v1.0
CREST CISR Maturity Assessment
Structured evaluation tool based on the CREST Cyber Incident Simulation Review (CISR) maturity model. Assesses IR capability across 8 domains — Governance, Detection & Alerting, IR Capability, Regulatory Reporting, People & Skills, Technical Tooling, Recovery & BCP, and Continuous Improvement. Scored 0–4 per question with evidence prompts, per-domain radar, and auto-generated engagement timeline, budget band and resourcing plan.
8
Domains
0–4
Maturity
IR
Roadmap
£
Budget Band
CRESTCISRIR Maturity8 DomainsGovernanceDetectionRegulatoryBCP / DRRadar ChartEngagement TimelineBudget Estimate
Open tool →
Risk & Threat Intelligence
4 tools
Risk Management
Cyber Risk Matrix
Interactive cyber risk matrix for plotting and managing risks by likelihood and impact. Supports custom risk entries, risk scoring, and visual risk appetite overlay to prioritise treatment decisions.
Risk Register5×5 MatrixRisk AppetiteRisk Scoring
Open tool →
Threat Intelligence
Threat Actor Profiles
Reference profiles for key threat actor groups — covering motivations, typical TTPs, targeted sectors and geographic focus. Useful for threat modelling, risk assessments and briefing stakeholders.
Threat ActorsTTPsMITRE ATT&CKCTI
Open tool →
Threat Intelligence
TI Workflow & Dissemination
End-to-end threat intelligence workflow covering the full intelligence lifecycle — from requirements and collection through processing, analysis, dissemination and feedback. Covers CVE/zero-day prioritisation, infrastructure intelligence, email security (DMARC/DKIM/SPF), credential exposure, TLP framework, STIX/TAXII, and feed targets across SIEM, EDR, firewall, vuln management and executive briefing.
TI LifecycleIOCsCVE / EPSSDMARCTLPSTIX / TAXIIDissemination
Open tool →
Threat Intelligence · Reference
CTI Reference Guide
Comprehensive cyber threat intelligence reference covering the full intelligence lifecycle, source taxonomy, intelligence types beyond IOCs, DMARC/DKIM/SPF email security intelligence, TLP framework, STIX 2.1 / TAXII 2.1 structured sharing, and dissemination targets. Reference companion to the TI Workflow tool.
CTITI LifecycleIOCsDMARCTLPSTIX / TAXIIReference
Open tool →
Compliance & Regulation
1 tool
Operations & Tooling
3 tools
Reference Documents
2 docs

// BREACH DETECTED — SNAKE PROTOCOL INITIATED

You found the easter egg
SCORE: 0
ARROW KEYS / WASD