ChrisRimondi / VulntoES
Vulnerability Data in ES
☆146Updated 7 years ago
Alternatives and similar repositories for VulntoES:
Users that are interested in VulntoES are comparing it to the libraries listed below
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 5 years ago
- Bro scripts to be shared with the community☆109Updated 11 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Threat Analysis, Reconnaissance, and Data Intelligence System☆125Updated 9 years ago
- Passive DNS collection using Zeek☆182Updated last year
- Scripts for Bro IDS and ELK Stack☆56Updated 9 years ago
- The Seeker of IOC☆129Updated 4 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- Modern Honey Network App for Splunk☆50Updated 5 years ago
- A Simple QUEry and Report Tool☆142Updated 5 years ago
- Common Vulnerabilities and Exposures - Portal☆84Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆263Updated 7 years ago
- Elasticsearch for Offensive Security☆139Updated 4 years ago
- A Simple Elasticsearch Honeypot☆186Updated 9 years ago
- passivedns-client provides a library and a query tool for querying several passive DNS providers☆198Updated 3 years ago
- Web service for scanning pcaps with snort☆108Updated 6 years ago
- ☆140Updated 8 months ago
- Smart Install Client Scanner☆61Updated 5 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆96Updated 8 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- Repo for autosnort scripts.☆156Updated 4 years ago
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Updated 5 years ago
- Kvasir: Penetration Test Data Management☆426Updated 6 years ago
- Automate NMAP Scans and Generate Custom Nessus Policies Automatically☆146Updated 8 years ago
- Credential Phish Analysis and Automation☆96Updated 6 years ago
- Rule sets for Sagan☆102Updated 4 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 4 years ago
- Honeypot deployment made easy☆235Updated 5 years ago
- Subdomain Analyzer☆76Updated 7 years ago