Security automation content in SCAP, Bash, Ansible, and other formats
-
Updated
Jan 8, 2025 - Shell
Security automation content in SCAP, Bash, Ansible, and other formats
NIST Certified SCAP 1.2 toolkit
The Correlated CVE Vulnerability And Threat Intelligence Database API
SCAP Scanner And Tailoring Graphical User Interface
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
Understand OVAL results in a blink of an eye
Scripts for easy system administration
OVAL For CentOS
Automated System Hardening (ash-linux) is a Salt formula to apply SCAP benchmarks to Linux systems
This GitHub repository focuses on enhancing the security posture of Windows systems by implementing rigorous hardening measures aligned with the guidelines provided by the Defense Information Systems Agency (DISA) Security Technical Implementation Guides (STIGs) and the Center for Internet Security (CIS) Benchmarks.
Useful Un*x / BSD / macOS utilities
Dockerised Greenbone Vulnerability Management components
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.
This repository is part of the paper "Better Safe Than Sorry! Automated Identification of Breaking Security-Configuration Rules" accepted at the "4th ACM/IEEE International Conference on Automation of Software Test (AST)". https://conf.researchr.org/home/ast-2023
This repository is part of the paper Automated Implementation of Windows-related Security-Configuration Guides presented at the 35th IEEE/ACM International Conference on Automated Software Engineering.
Add a description, image, and links to the scap topic page so that developers can more easily learn about it.
To associate your repository with the scap topic, visit your repo's landing page and select "manage topics."