SerNet / veriniceLinks
verinice is a tool for managing information security.
☆214Updated last year
Alternatives and similar repositories for verinice
Users that are interested in verinice are comparing it to the libraries listed below
Sorting:
- The "TaSK Framework" is a configurable test tool for performing TLS conformity tests based on the Technical Guideline TR-03116-TS.☆141Updated 2 years ago
- Useful scripts to maintain i-doit☆23Updated 9 months ago
- Documentation on the OpenRMF application, including scripts to run the whole stack as well as just infrastructure with documentation on u…☆150Updated 2 months ago
- MONARC - Method for an Optimised aNAlysis of Risks by @NC3-LU☆118Updated 3 weeks ago
- 34 Policy Templates☆88Updated last year
- Über die Stand-der-Technik-Bibliothek stellt das BSI seine Vorschriften und Richtlinien in einem maschinenlesbaren Format bereit. Inhalte…☆167Updated last week
- Keycloak Configuration Auditor☆89Updated this week
- Management tool for the information security management system / Outil de gestion du système de management de la sécurité de l'informatio…☆329Updated this week
- LSC engine☆130Updated last week
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Tracking and reporting for IT and related assets and configuration☆205Updated last week
- Web-based ERP system for the German market☆112Updated this week
- OpenXPKI Code☆662Updated 4 months ago
- Keeps a sample configuration for OpenXPKI. You can clone from this repo to manage your own configuration while keeping track of the upstr…☆34Updated 5 months ago
- OpenSSH proxy gateway☆63Updated 2 weeks ago
- verinice.veo is a cloud-native application for managing information security and data protection☆20Updated this week
- Univention Corporate Server☆264Updated last week
- BITS-Quellcode, auch für das hugo-Tool zum Erzeugen statischer HTML-Seiten☆18Updated last month
- An Apache module with a simple SAML 2.0 service provider☆133Updated last year
- OpenKAT scans networks, finds vulnerabilities and creates accessible reports. It integrates the most widely used network tools and scanni…☆145Updated this week
- SCAP Scanner And Tailoring Graphical User Interface☆234Updated last year
- FileSender server software☆297Updated this week
- Guidance for mitigating obsolete Transport Layer Security configurations. #nsacyber☆271Updated 5 years ago
- Evolveum MidPoint: Identity Management (IDM) and Identity Governance (IGA)☆462Updated this week
- Peekaboo Extended Email Attachment Behavior Observation Owl☆69Updated 2 months ago
- Mapping the information system / Cartographie du système d'information☆469Updated last week
- An online multiplayer version of the threat modeling card games: Elevation of Privilege (EoP), OWASP Cornucopia, OWASP Cumulus, and Eleva…☆83Updated this week
- Rudder is a configuration and security automation platform. Manage your Cloud, hybrid or on-premises infrastructure in a simple, scalable…☆622Updated this week
- Greenbone Security Assistant - The web frontend for the Greenbone Community Edition☆250Updated this week
- ☆38Updated 3 years ago