Ansible role for security standards compliance
☆13Mar 6, 2019Updated 7 years ago
Alternatives and similar repositories for compliant
Users that are interested in compliant are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ansible role that configures a host to be a target in a cyber range☆15Mar 17, 2019Updated 7 years ago
- Quantitate binary risk assessment☆17May 9, 2022Updated 3 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45May 9, 2022Updated 3 years ago
- Containerized pentesting tools☆46May 9, 2022Updated 3 years ago
- A simple script to patch smali file to include a Fake Security Provider at 1 for Android Apps☆18Jan 19, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Git-Finder is a tool that searches through public repositories to find sensitive information like password,auth_token, etc uploaded to t…☆13Mar 15, 2020Updated 6 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 6 years ago
- ‹ᴜɴᴍᴀɪɴᴛᴀɪɴᴇᴅ› Scaffolding to generate Amazon EC2 AMIs for Arch Linux.☆28Dec 30, 2015Updated 10 years ago
- API for nCrypt.site☆10Jun 25, 2022Updated 3 years ago
- Ansible Network Cisco IOS-XR Provider Role☆14Jun 29, 2020Updated 5 years ago
- A Python module for Palo Alto Networks' WildFire API☆11Feb 18, 2020Updated 6 years ago
- OSCAL SSP content for technologies shipped by Red Hat☆16Mar 2, 2023Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Apr 24, 2026Updated last week
- ☆11Mar 14, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Python BlueSky client☆10Aug 4, 2023Updated 2 years ago
- ☆22Aug 3, 2024Updated last year
- My various command line scripts that I'm using on my Debian desktops and servers☆12Apr 8, 2026Updated 3 weeks ago
- w3af packaging for Kali distribution☆26Nov 29, 2015Updated 10 years ago
- ☆22Jun 23, 2016Updated 9 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 9 months ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.