Centurix / Pantastic
Credit Card PAN scanner.
☆17Updated 9 months ago
Alternatives and similar repositories for Pantastic:
Users that are interested in Pantastic are comparing it to the libraries listed below
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- Create Logstash events from the Okta API!☆19Updated 2 years ago
- Packer.io Scripts to build the SIFT VM(s)☆11Updated 4 years ago
- A low/zero interaction ssh authentication logging honeypot☆21Updated 8 months ago
- DevSecOps command line asset inventory tool☆29Updated last year
- Builds a hardened EKS AMI☆16Updated 4 years ago
- A starter-kit for a source-controlled, CLI-based osquery management workflow.☆30Updated 6 years ago
- The Auditree data gathering and reporting tool.☆13Updated 7 months ago
- Two-factor authentication for OpenVPN☆14Updated 7 years ago
- Terraform module to create a peering connection between a backing services VPC and a VPC created by Kops☆10Updated 4 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆15Updated 2 years ago
- Example Express application for collecting data from the Stethoscope app☆14Updated 6 years ago
- ☆42Updated 4 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Updated 2 years ago
- An SSH certificate authority framework to sign SSH pubkey requests based on SAML assertions☆28Updated 4 years ago
- Pragmatic Network Security for Cloud and Hybrid Networks☆11Updated 9 years ago
- Service mapping API☆24Updated last year
- OpenControl-formatted industry standards and requirement documents☆45Updated last year
- DNSmetrics connects to your accounts at multiple managed DNS providers using their APIs and emits standardized metrics in statsd format f…☆14Updated 6 years ago
- GSA Security Benchmarks and Tools☆21Updated 5 years ago
- Security oriented images for Docker☆17Updated 9 years ago
- Duo Authentication Proxy in a docker container☆37Updated last year
- A tool for getting SSH keys out of LDAP☆48Updated 2 years ago
- A serverless SSH certificate authority to control access to machines using IAM and Lambda☆51Updated 6 years ago
- Install and configure user mode auditd tools☆34Updated 2 years ago
- It tells you when you VPN☆13Updated 2 years ago
- Executing Dome9 Compliance engine assessments via API for continuous compliance and governance☆10Updated 5 years ago
- Cloud Auxiliary is a python wrapper and orchestration module for interacting with cloud providers☆76Updated 2 years ago
- Make your Markdown sparkle!☆20Updated 2 years ago
- Applied Configuration Management☆39Updated this week