Tool for generating a report from results of oscap scan.
☆26Oct 4, 2024Updated last year
Alternatives and similar repositories for openscap-report
Users that are interested in openscap-report are comparing it to the libraries listed below
Sorting:
- ☆15Feb 24, 2020Updated 6 years ago
- ☆40Mar 13, 2026Updated last week
- NIST Certified SCAP 1.2 toolkit☆1,680Feb 27, 2026Updated 3 weeks ago
- An Ansible Playbook to automatically set up a Red Hat Satellite server☆25Nov 19, 2024Updated last year
- Configuration templates and scripts for the firewall subsystem.☆13Jun 20, 2024Updated last year
- Bro analyzer that detects Google's QUIC protocol☆10Mar 2, 2021Updated 5 years ago
- Its the programmed ATM card that can hack into all ATM machines. Its works with any currency and in any country where you might be living…☆10May 15, 2016Updated 9 years ago
- Salt formula for bootstrapping an HA cluster☆11Aug 16, 2022Updated 3 years ago
- Soft and Hard Unlocks everything in Combat Master all using melon loader☆10Sep 11, 2024Updated last year
- ☆14May 30, 2023Updated 2 years ago
- GNS3 Topology Converter☆12Aug 30, 2016Updated 9 years ago
- demo material for my PowerShell Scripting Secrets presentation☆15Nov 20, 2017Updated 8 years ago
- ☆12May 11, 2018Updated 7 years ago
- Vyatta configuration templates and scripts for Quagga/FRR☆10Jun 20, 2024Updated last year
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 2 years ago
- Galaxy-Operator☆16Mar 12, 2026Updated last week
- Server for https://github.com/fippo/rtcstats☆16Mar 12, 2026Updated last week
- Some Python to process the Wikileaks Cablegate data.☆19Nov 30, 2010Updated 15 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Installer for Kiosk Mode applications that sets lock mode.☆12Jan 28, 2021Updated 5 years ago
- Friends of in-toto! A place to record integrations and adoptions of the in-toto specification.☆21Updated this week
- ☆11Jun 3, 2025Updated 9 months ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- how to hack pattern lock☆15Dec 27, 2020Updated 5 years ago
- ☆13Sep 26, 2024Updated last year
- LANL Supercomputing Institute curriculum☆14Sep 25, 2019Updated 6 years ago
- ☆16Apr 23, 2021Updated 4 years ago
- A Experimental Project On Permutations And Combinations For Bruteforce Algorithms☆10Sep 12, 2024Updated last year
- Dropbear SSH tools with ed25519 and other improvements by pts☆27Aug 16, 2018Updated 7 years ago
- ☆16Apr 23, 2021Updated 4 years ago
- An Ansible role for basic configuration of RHEL/CentOS 7 based machines.☆11May 10, 2016Updated 9 years ago
- Ansible role for configuring Network Bound Disk Encryption clients (e.g. clevis)☆17Updated this week
- DEF CON Hacker Tracker☆14Jul 30, 2025Updated 7 months ago
- The Source Code for the 31 Days of Windows 8☆61Dec 14, 2012Updated 13 years ago
- QEMU IPMI devices☆13Feb 23, 2026Updated 3 weeks ago
- Serverless prisma2 example with auth and subscriptions*☆15Jan 24, 2023Updated 3 years ago
- # LIRI Bot ### Overview In this assignment, you will make LIRI. LIRI is like iPhone's SIRI. However, while SIRI is a Speech Interpretat…☆11Feb 15, 2019Updated 7 years ago
- OSPd is a framework for vulnerability scanners which share the same communication protocol: OSP (Open Scanner Protocol)☆33Nov 29, 2021Updated 4 years ago
- Project materials for Seaberry Pi CM4 carrier board☆17Jan 26, 2023Updated 3 years ago