0x4D31 / salt-scannerLinks
Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
☆263Updated 7 years ago
Alternatives and similar repositories for salt-scanner
Users that are interested in salt-scanner are comparing it to the libraries listed below
Sorting:
- Neet - Network Enumeration and Exploitation Tool☆168Updated 8 years ago
- Vulnerability scanner based on vulners.com audit API☆200Updated 6 years ago
- Vulnerability Data in ES☆145Updated 7 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- Db Database Assessment Tool☆210Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆161Updated 5 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Updated 3 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Updated 5 years ago
- A UNIX security auditing tool based on several security frameworks☆317Updated 2 months ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- Next Generation Firewall Audit and Bypass Tool☆267Updated 8 years ago
- Post-exploitation framework (and an interactive shell) developed in Bash shell scripting☆313Updated 8 years ago
- Various Tools and Docker Images☆280Updated 3 months ago
- PyShell makes interacting with web-based command injection less painful, emulating the feel of an interactive shell as much as possible.☆253Updated 8 years ago
- This script invokes tcpdump over ssh piping to STDOUT, allowing remote use of wireshark☆101Updated 6 years ago
- dockscan is security vulnerability and audit scanner for Docker installations☆219Updated 8 years ago
- Check UNIX/Linux systems for privilege escalation☆125Updated 9 years ago
- Kvasir: Penetration Test Data Management☆430Updated 6 years ago
- CERT Tapioca for MITM network analysis☆183Updated last year
- Recon, Subdomain Bruting, Zone Transfers☆231Updated 9 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Local Privilege Escalation☆207Updated 8 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- User, contributor and developer friendly vulnerability database☆128Updated 6 years ago
- ☆141Updated last year
- Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats…☆495Updated 9 months ago
- Rainmap Lite - Responsive web based interface that allows users to launch Nmap scans from their mobiles/tablets/web browsers!☆233Updated 4 years ago
- proxy poc implementation of STARTTLS stripping attacks☆168Updated 3 years ago