OSCAL SSP content for technologies shipped by Red Hat
☆16Mar 2, 2023Updated 2 years ago
Alternatives and similar repositories for oscal
Users that are interested in oscal are comparing it to the libraries listed below
Sorting:
- Tools for the OSCAL project☆37Mar 16, 2023Updated 2 years ago
- A Java library to support processing OSCAL content☆37Dec 17, 2025Updated 2 months ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- An initial OpenAPI definition of an OSCAL REST API.☆41Sep 18, 2024Updated last year
- Joint NIST/FedRAMP tool to interact with OSCAL files via a browser-based GUI☆48Feb 5, 2020Updated 6 years ago
- ☆18Jul 14, 2021Updated 4 years ago
- Open Security Controls Assessment Language (OSCAL) Deep Differencing Tool☆38Jul 19, 2023Updated 2 years ago
- ☆19Oct 19, 2021Updated 4 years ago
- NIST OSCAL SDK and CLI☆39Apr 28, 2020Updated 5 years ago
- Demo setup for compliance-trestle☆37Jan 28, 2026Updated last month
- ☆13Nov 18, 2025Updated 3 months ago
- OpenControl Database☆11Jan 5, 2023Updated 3 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Language snippets for use with `vim-cheat`☆10Jan 1, 2023Updated 3 years ago
- Simplified go-cat agent for caldera☆11Dec 18, 2023Updated 2 years ago
- Generic Signature Format for SIEM Systems☆14Oct 27, 2021Updated 4 years ago
- cloud.gov security policies and procedures☆27May 28, 2025Updated 9 months ago
- A web application to streamline the development of STIGs from SRGs☆84Updated this week
- NIST SP 800-171 OSCAL Content☆16Nov 23, 2022Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Feb 18, 2026Updated last week
- Scripts to import OSCAL example content into the Neo4J graph database☆32Jan 28, 2023Updated 3 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 6 years ago
- Docker build of GovReady☆14Nov 14, 2023Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆17Feb 12, 2026Updated 2 weeks ago
- Various deployments of the OSCAL editor☆48Jul 30, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Dependency vulnerability auditor for Ruby☆13Jan 22, 2026Updated last month
- Pattern recognition for hosts, services, and content☆14Aug 19, 2022Updated 3 years ago
- Template repo for Conjur repositories☆17Nov 3, 2025Updated 3 months ago
- DefectDojo Community Content☆18Nov 9, 2025Updated 3 months ago
- ☆22Jul 12, 2024Updated last year
- Tool for signing and verifying the integrity of CloudFormation templates☆15Feb 16, 2023Updated 3 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Feb 5, 2022Updated 4 years ago
- Implementation of the OSCAL REST API☆19Feb 23, 2024Updated 2 years ago
- A curated threat modeling library collection☆24Dec 1, 2023Updated 2 years ago
- Template for building a packet sniffer☆15Mar 25, 2024Updated last year
- Tools for security content automation, baseline tailoring, and overlay development.☆45Aug 30, 2024Updated last year
- Automate the creation of a System Security Plan (SSP)☆48Feb 11, 2026Updated 2 weeks ago