Ansible role for security standards compliance
☆13Mar 6, 2019Updated 7 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- Git-Finder is a tool that searches through public repositories to find sensitive information like password,auth_token, etc uploaded to t…☆12Mar 15, 2020Updated 6 years ago
- ‹ᴜɴᴍᴀɪɴᴛᴀɪɴᴇᴅ› Scaffolding to generate Amazon EC2 AMIs for Arch Linux.☆28Dec 30, 2015Updated 10 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- API for nCrypt.site☆10Jun 25, 2022Updated 3 years ago
- A Python module for Palo Alto Networks' WildFire API☆11Feb 18, 2020Updated 6 years ago
- Ansible Network Cisco IOS-XR Provider Role☆14Jun 29, 2020Updated 5 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Mar 16, 2026Updated last week
- ☆11Mar 14, 2021Updated 5 years ago
- Python BlueSky client☆10Aug 4, 2023Updated 2 years ago
- ☆22Aug 3, 2024Updated last year
- My various command line scripts that I'm using on my Debian desktops and servers☆12Dec 15, 2025Updated 3 months ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- ☆22Jun 23, 2016Updated 9 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 8 months ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Jun 25, 2018Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Dec 1, 2014Updated 11 years ago
- Various scripts to check for web applications, Linux OS etc vulnerabilities.☆20Jun 5, 2022Updated 3 years ago
- ☆18Jul 14, 2021Updated 4 years ago
- lua function to get a formatted string with the current battery status. Can be used to fill a text widget in the awesome window manager.☆26Feb 18, 2017Updated 9 years ago
- Simplified NAT Slipstream server and client☆22Dec 4, 2020Updated 5 years ago
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- Converts the output from Invoke-Kerberoast into hashcat format.☆33Nov 13, 2018Updated 7 years ago
- Advanced Next.js Masterclass: a workshop by Atila Fassina and Smashing Magazine☆13Dec 15, 2022Updated 3 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Feb 13, 2022Updated 4 years ago
- Simple Shellcode development/injection on macOS☆11Nov 6, 2017Updated 8 years ago
- ☆13May 27, 2024Updated last year
- Modified version of PEAS client for offensive operations☆42Jan 16, 2023Updated 3 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- GSA Security Benchmarks and Tools☆21Sep 19, 2019Updated 6 years ago
- Ansible Network Config Manager Role☆23Jul 23, 2019Updated 6 years ago
- ☆12Nov 21, 2019Updated 6 years ago
- Simple, one command minimal production deployment for Fleet☆19Mar 12, 2025Updated last year
- Vulnerable EDR☆24Nov 15, 2024Updated last year