☆17Jul 17, 2024Updated last year
Alternatives and similar repositories for Content-Library-CIM1
Users that are interested in Content-Library-CIM1 are comparing it to the libraries listed below
Sorting:
- ☆19May 1, 2025Updated 10 months ago
- Azure Function App to serve as midddleware for a logon script solution for cloud managed devices.☆15Apr 25, 2023Updated 2 years ago
- Analysis of the Enterprise SAST/DAST product landscape☆38Feb 28, 2024Updated 2 years ago
- Cybersecurity Psychology Framework☆19Feb 22, 2026Updated last week
- Exploit for CVE-2024-27198 - TeamCity Server☆35Dec 19, 2024Updated last year
- Manage Jira assets in your code or CLI☆13Feb 17, 2026Updated 2 weeks ago
- Kernels for Untangle products☆10Jan 29, 2026Updated last month
- One line command and control backdoors for APIs and web applications.☆51Apr 9, 2024Updated last year
- Perform file-based malware scan on your on-prem servers with AWS☆14Oct 31, 2023Updated 2 years ago
- The Advanced Vulnerability Information Sharing Environment -- A Platform for CVD and PSIRT Management☆10Jan 30, 2024Updated 2 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Netbox plugin that accepts and process incomming webhooks☆15Oct 1, 2024Updated last year
- The Public Physical Pentesting Paraphernalia Project (P5) is a collection of 3D printing models, DIY tool instructions and entry-level me…☆12Sep 6, 2019Updated 6 years ago
- Benchmark Generator to create skeleton Ansible content from baseline XCCDF files.☆10Sep 10, 2020Updated 5 years ago
- Ansible Modules to manage Citrix Netscaler devices☆12Dec 20, 2018Updated 7 years ago
- Dynamically configure Juniper network devices using metadata from Netbox. Mirror of https://gerrit.wikimedia.org/g/operations/software/ho…☆14Jan 12, 2026Updated last month
- Security scanning tool that integrates with Veeam Backup & Replication to perform vulnerability assessments on backup data without needin…☆13Aug 5, 2025Updated 6 months ago
- ☆12Oct 22, 2023Updated 2 years ago
- Postman collections for Redfish requests against HPE servers☆13Apr 18, 2021Updated 4 years ago
- Front end (UI) plugin to support security-analytics☆16Feb 13, 2026Updated 2 weeks ago
- Sample Random GitHub Repositories☆11Dec 27, 2025Updated 2 months ago
- vSphere metrics plugin for collectd☆11Feb 12, 2019Updated 7 years ago
- Infrastucture-as-Code in Reverse☆11Oct 2, 2019Updated 6 years ago
- This repository provide a json file for all Windows security Event IDs with lot of useful informations (Categories, GPO, Volume, Recomman…☆11Mar 2, 2023Updated 3 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- This sample is a demonstration of what a Microsoft Graph service on IFTTT could look like. The purpose is to spark exploration by third p…☆14May 23, 2024Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- ☆11Dec 26, 2023Updated 2 years ago
- ☆11Apr 1, 2025Updated 11 months ago
- [WIP] Adds physical storage device support to Netbox, primarily intended for SAS/SATA/NVMe type devices.☆12Mar 11, 2024Updated last year
- Tool for analyzing SAP Secure Network Communications (SNC).☆59Apr 16, 2024Updated last year
- ☆10Apr 28, 2020Updated 5 years ago
- Security Blogs - A simple aggregator for security news/blog☆24Jan 19, 2026Updated last month
- A sample API that retrieves constellations as an example to demonstrate features in the OpenAPI 3.0 specification.☆14Nov 12, 2024Updated last year
- Maltego Local Transform to use Hybrid Analysis Public API - https://www.hybrid-analysis.com/apikeys/info☆12Sep 7, 2018Updated 7 years ago
- Automated STIG Benchmark Compliance Audit for RHEL 8 with Ansible & GOSS☆12Updated this week
- 📈DevStats deployment on Kubernetes using Equinix servers and Helm, CoreDNS, containerd, MetalLB, OpenEBS, nginx-ingress, nginx, cert-man…☆15Updated this week
- Cross-platform CLI tool to make remote command execution in AWS a breeze☆13Feb 25, 2023Updated 3 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago