cdppcorp

cdppcorp / KESE-KIT

Public

KISA 주요정보통신기반시설 기술적 취약점 분석 평가방법 상세가이드 기반 Skills

103
10
89% credibility
Found Mar 29, 2026 at 101 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

KESE-KIT is a plugin toolkit for AI coding assistants that performs comprehensive security vulnerability assessments for critical infrastructure based on Korean government guidelines.

How It Works

1
🔍 Discover the security toolkit

You hear about KESE-KIT, a helpful guide for checking vulnerabilities in important systems like networks and computers, based on trusted safety rules.

2
📥 Add it to your AI helper

In your AI coding assistant, you easily install the toolkit from its marketplace with a simple instruction.

3
🚀 Kick off the full check

You tell your assistant to start the complete review, covering tech setups, office rules, and physical protections.

4
📋 Run a quick pre-check

Before going live, you get a handy checklist to spot any easy compliance issues right away.

5
🔧 Get fix ideas and guides

Your assistant creates ready-to-use improvement scripts and tips for safer coding and setups.

Enjoy secure and compliant systems

You now have a thorough report and steps to make your critical systems safe, following official guidelines.

Sign up to see the full architecture

4 more

Sign Up Free

Star Growth

See how this repo grew from 101 to 103 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is KESE-KIT?

KESE-KIT is a Python-based Claude Code plugin that automates vulnerability assessments for critical information infrastructure using KISA guidelines. It runs full scans covering 424 technical checks across Unix, Windows, web, DB, cloud, and more, plus 127 administrative and 9 physical items, via simple slash commands like /kesekit-en:start or /kesekit-ko:check. Developers get pre-deployment checklists, auto-generated hardening scripts for Unix/Windows/web/DB, and secure coding prompts—kit kaise use kare for KISA compliance without manual audits.

Why is it gaining traction?

It stands out with bilingual English/Korean skills tailored to Korean laws like the Information and Communications Infrastructure Protection Act, filling a gap in automated CII tools beyond generic scanners. The hook is one-command full assessments and fix scripts, saving hours on compliance reporting, unlike fragmented OWASP checklists. Python skills integrate seamlessly into Claude Code workflows for quick kisa evaluations.

Who should use this?

Korean security engineers auditing public sector CIIP projects, DevOps teams prepping e-government deployments, or compliance officers handling national info sec guidelines. Ideal for those needing physical/admin checks alongside technical scans, like SCADA operators or cloud admins facing KISA audits.

Verdict

Grab it if you're in Korean infra security—solid docs and 560+ item coverage make it practical despite 92 stars and 0.9% credibility score signaling early maturity. Test on non-prod first; lacks broad adoption but nails niche KISA skills. (187 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.