praiseordu / PCI-DSS-Compliance-Toolkit
The PCI DSS Compliance Toolkit is an open-source project aimed at helping organizations achieve and maintain compliance with the (PCI DSS). This toolkit provides essential resources, tools, and documentation to streamline the compliance process, ensuring the secure handling of cardholder data.
☆13Updated last year
Alternatives and similar repositories for PCI-DSS-Compliance-Toolkit:
Users that are interested in PCI-DSS-Compliance-Toolkit are comparing it to the libraries listed below
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆16Updated 2 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆14Updated 3 years ago
- This repository services the UNO Cybersecurity capstone (CYBR 4580/8950)☆10Updated 11 months ago
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated last year
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- A collection of tested automations for implementing DoD STIGs and SRGs☆10Updated 8 months ago
- Virtualization Security Audit Tool - Security assess CIS compliance of a Virtualization environments☆12Updated last year
- Technical cyber security resources across the NIST cyber security framework lifecycle☆10Updated 3 years ago
- Cyber | Cloud Security Checklist | Incident Response | Policy Template | Use cases☆13Updated 4 years ago
- A curated list of GPT agents for cybersecurity☆8Updated 6 months ago
- Create machine images containing the Nessus vulnerability scanner☆12Updated last week
- ☆11Updated 4 years ago
- MITRE ATT&CK Based App in Power BI☆13Updated last year
- A generic security incident response playbook investigating and responding to potential compromises of Okta's internal systems, in the co…☆19Updated 3 years ago
- A collection of tools for managing and automating vulnerability management.☆13Updated 3 years ago
- A SOC Analyst's tool to automate the investigation & validation of possible Indicators of Compromise (IOCs) and perform various tasks inc…☆22Updated 2 years ago
- A collection of cybsecurity tools, software, libraries, learning tutorials, frameworks, academic and practical resources in security.☆12Updated last year
- Simple username generator based on a list of name and surname☆12Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 4 months ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆17Updated this week
- ThreatWorx Information Gathering Script (twigs) to discover assets like hosts, cloud instances, containers and repositories of projects.☆12Updated 2 weeks ago
- AutoSpamEmailScan.ps1 is used to monitor a specific mailbox that enterprise users can forward suspicious spam emails to a specific mailbo…☆16Updated 2 years ago
- A collection of PowerShell modules for interacting with the Shodan API. Includes modules for returning information about the API, client …☆24Updated 8 months ago
- PhotOSINT is an OSINT chrome extension for images and photos. It scans each webpage for images with EXIF data, while the user is browsing…☆59Updated 3 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Yet another OSINT automator.☆19Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆16Updated last year
- A collection of awesome framework, libraries, learning tutorials, videos, webcasts, technical resources and cool stuff about General Data…☆16Updated last year