Ansible role for security standards compliance
☆13Mar 6, 2019Updated 6 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below
Sorting:
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 6 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Ansible Network Cisco IOS-XR Provider Role☆14Jun 29, 2020Updated 5 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Feb 24, 2026Updated last week
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- ☆18Jul 14, 2021Updated 4 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- Various scripts to check for web applications, Linux OS etc vulnerabilities.☆20Jun 5, 2022Updated 3 years ago
- Apollo: Online Machine Learning for Performance Portability☆26Aug 27, 2024Updated last year
- Ansible Network Config Manager Role☆23Jul 23, 2019Updated 6 years ago
- GSA Security Benchmarks and Tools☆21Sep 19, 2019Updated 6 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- Python BlueSky client☆10Aug 4, 2023Updated 2 years ago
- ☆24Feb 2, 2026Updated last month
- CLI tool for graylog-project☆25Dec 4, 2025Updated 3 months ago
- OpenBMP Collector☆30Oct 20, 2022Updated 3 years ago
- Source Code - https://github.com/USStateDept/State-TalentMAP☆13Sep 12, 2023Updated 2 years ago
- ☆20Nov 29, 2023Updated 2 years ago
- Django with Data Science [Video], published by Packt☆12Dec 15, 2025Updated 2 months ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Node.js SDK for IBM X-Force Exchange☆15Aug 20, 2018Updated 7 years ago
- Contract for a CryptoFiat currency☆11Aug 25, 2018Updated 7 years ago
- A stable Java API for interfacing with and extending OpenNMS☆14Jan 27, 2026Updated last month
- Flask app for connecting Munki and MicroMDM☆13Jun 17, 2022Updated 3 years ago
- Documentation website source code for Concord☆15Feb 10, 2026Updated 3 weeks ago
- ☆15Feb 21, 2023Updated 3 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- CPU miner for Litecoin and Bitcoin☆16Mar 27, 2014Updated 11 years ago
- Linux Foundation Certified Engineer (LFCE) learning materials☆12Mar 6, 2022Updated 3 years ago
- database-course☆13Jan 6, 2023Updated 3 years ago
- Ansible Playbooks with Cumulus NCLU (net commands)☆11Aug 22, 2017Updated 8 years ago
- ☆11Feb 9, 2026Updated 3 weeks ago
- ☆15Aug 19, 2020Updated 5 years ago
- ☆16Updated this week