Ansible role that configures Ubuntu 18.04 to CIS Benchmark v1.1.0
☆16Apr 9, 2021Updated 4 years ago
Alternatives and similar repositories for ubuntu-18.04-cis-benchmark-for-ansible
Users that are interested in ubuntu-18.04-cis-benchmark-for-ansible are comparing it to the libraries listed below
Sorting:
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- Advanced malware sandbox evasion using C☆21Jan 23, 2026Updated last month
- ☆11Aug 31, 2019Updated 6 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- Spider and analyze vaadin applications with OWASP ZAP - the app mediates between the two.☆12Nov 24, 2022Updated 3 years ago
- A faithful transposition of the key features/functionality of @itm4n's PPLDump project as a BOF.☆15Oct 31, 2022Updated 3 years ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Self-hosted observability for AI coding agents. Clone. Configure. See.☆46Updated this week
- Improvised LSB Steganography technique using Pixel Locator Sequence with AES. Implementation for paper https://ieeexplore.ieee.org/abstra…☆11Apr 17, 2021Updated 4 years ago
- ☆66Oct 19, 2021Updated 4 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- Tools for Incident Response and Malware Analysis☆11Feb 9, 2025Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- Cracking Passwords with Neural Networks☆11Nov 18, 2020Updated 5 years ago
- Enable EFS service as low priv user (PE & BOF)☆21Jul 6, 2025Updated 8 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- ☆15Oct 29, 2024Updated last year
- ☆11Jun 26, 2024Updated last year
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- A detailed list of potentially dangerous file extensions☆18Jun 18, 2025Updated 8 months ago
- Azure Offensive Library☆17Oct 18, 2025Updated 4 months ago
- Invoke-SPSI - Simple PowerShell Shellcode Injector☆37Oct 9, 2025Updated 5 months ago
- ☆15May 30, 2025Updated 9 months ago
- Compiled Binaries for Sharp Suite☆15Dec 28, 2019Updated 6 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- RACF Database Parser☆12Apr 4, 2024Updated last year
- Magento Security Scanner☆13Jan 10, 2022Updated 4 years ago
- Scripts aiding penetration testing of Splunk Enterprise systems☆10Jan 29, 2019Updated 7 years ago
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Dll hijack -- just one macro☆13Jul 3, 2023Updated 2 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- dcsync bof☆45Feb 13, 2026Updated 3 weeks ago
- PoC: process watcher patterns to make killing a process hard.☆11Aug 1, 2018Updated 7 years ago
- This is a simple python binding of Stag Fiducial Marker Detection System☆12Mar 7, 2022Updated 4 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago