RedHatOfficial / ansible-role-rhel7-pci-dssView external linksLinks
PCI-DSS v4.0 Control Baseline for Red Hat Enterprise Linux 7 - Ansible role generated from ComplianceAsCode Project
☆28Oct 30, 2025Updated 3 months ago
Alternatives and similar repositories for ansible-role-rhel7-pci-dss
Users that are interested in ansible-role-rhel7-pci-dss are comparing it to the libraries listed below
Sorting:
- PCI-DSS v4.0.1 Control Baseline for Red Hat Enterprise Linux 8 - Ansible role generated from ComplianceAsCode Project☆28Jan 27, 2026Updated 3 weeks ago
- PCI-DSS v3 Control Baseline for Red Hat Enterprise Linux 7 - Ansible role generated from ComplianceAsCode☆16Dec 11, 2018Updated 7 years ago
- nginx config for PCI-DSS, HIPPA, and NIST compliance☆57Apr 29, 2019Updated 6 years ago
- Installation templates and other objects for installing Red Hat Fuse Online (based on Syndesis)☆13Jul 12, 2022Updated 3 years ago
- PCI-DSS toolkit to help scope web applications☆18Jun 8, 2016Updated 9 years ago
- ☆17May 2, 2024Updated last year
- GCP PCI-DSS 3.2.1 InSpec Profile☆18May 26, 2021Updated 4 years ago
- Tools for use in supporting the operation of Satellite 6☆44Mar 27, 2024Updated last year
- Demo for Elastic's Auditbeat and SIEM☆24Jun 15, 2021Updated 4 years ago
- Ansible role that installs Red Hat Satellite 6 Server☆15May 23, 2022Updated 3 years ago
- Repositorio con recursos de valor para los participantes de la 3ra edición del Programa de Fundamentos de Ciberseguridad (2022).☆13Apr 16, 2022Updated 3 years ago
- Account management module☆21Aug 13, 2025Updated 6 months ago
- Security information and event management, masters's diploma☆10Aug 3, 2015Updated 10 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Apr 16, 2019Updated 6 years ago
- Coalfire GCP RAMP/pak Reference Architecture☆13Feb 5, 2026Updated last week
- This project is a demo of the terraform work with the integration of Chef Inspec to be able to carry out IAC and later verification of th…☆10Mar 3, 2021Updated 4 years ago
- The C-Agent is a reference implementation of a Keyfactor Orchestrator geared toward use in IoT based solutions.☆12Aug 28, 2025Updated 5 months ago
- This is a templated to be used for QRL Jacking Sessions (Tested on Chrome,brave & firefox )☆13Feb 26, 2022Updated 3 years ago
- Ghi chép về snort, suricata, SIEM, OSSEC ...☆11Dec 4, 2018Updated 7 years ago
- Structure and Interpretation of Computer Programs☆13Oct 8, 2016Updated 9 years ago
- Build a project with Express.js☆11Jan 31, 2021Updated 5 years ago
- NIST transition-edge sensor (TES) data acquisition framework☆14Feb 2, 2026Updated 2 weeks ago
- ☆13Aug 28, 2025Updated 5 months ago
- Interactive summary of Gartner's Magic Quadrant for Web Content Management with d3.js☆17Oct 15, 2012Updated 13 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆36Oct 7, 2019Updated 6 years ago
- Very basic CLI SIEM (Security Information and Event Management system).☆40Mar 24, 2018Updated 7 years ago
- Add custom services to your Linux system.☆11Dec 17, 2025Updated 2 months ago
- metwork/mfserv module☆12Feb 7, 2026Updated last week
- ☆15Mar 3, 2021Updated 4 years ago
- Innora-Defender: 先进的勒索软件分析与恢复框架☆16May 6, 2025Updated 9 months ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- Ansible AWX code promotion solution using Ansible playbooks and the tower modules. This can be consumed via Jenkins, GitHub Actions, GitL…☆11Dec 18, 2019Updated 6 years ago
- Supports JBoss Forge plugins for the Fabric8 iPaaS along with using Forge as a REST service inside Fabric8 DevOps☆10Jun 18, 2018Updated 7 years ago
- Консольное приложение для скачивания архивных материалов с сайта https://cgamos.ru☆13Nov 7, 2025Updated 3 months ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- PowerShell Module for Extrahop☆15Dec 13, 2018Updated 7 years ago
- Spring integration with Stardog RDF database☆18Jan 27, 2025Updated last year
- Scanning alive hosts of the given CIDR range in parallel.☆10May 8, 2025Updated 9 months ago
- This is a phishing ready platform. Unlike other phishing methods, EvilnoVNC allows you to bypass 2FA using a real browser via noVNC conn…☆10Apr 7, 2023Updated 2 years ago