ChrisRimondi / VulntoESView external linksLinks
Vulnerability Data in ES
☆143Oct 17, 2017Updated 8 years ago
Alternatives and similar repositories for VulntoES
Users that are interested in VulntoES are comparing it to the libraries listed below
Sorting:
- NMap XML decoding for logstash☆28Nov 16, 2022Updated 3 years ago
- Graphical Web Interface for OSSEC☆73Jan 2, 2020Updated 6 years ago
- event shipper for Carbon Black Defense notifications☆10Feb 25, 2023Updated 2 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Oct 27, 2013Updated 12 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 11 years ago
- Elasticsearch for Offensive Security☆139Aug 21, 2020Updated 5 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- SIGMA UI is a free open-source application based on the Elastic stack and Sigma Converter (sigmac)☆189May 5, 2021Updated 4 years ago
- PowerShellMethodAuditor listens to the PowerShell ETW provider and logs PowerShell method invocations.☆37Sep 19, 2017Updated 8 years ago
- Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC API, parse, store and diff scan results. …☆24Feb 10, 2023Updated 3 years ago
- ☆24Jul 6, 2015Updated 10 years ago
- Mutable Universal Relay Document Kit☆17Oct 31, 2014Updated 11 years ago
- 一个xss利用平台☆18Jun 1, 2014Updated 11 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- Create actionable data from your Vulnerability Scans☆1,396Dec 27, 2022Updated 3 years ago
- Easy automated vulnerability scanning, reporting and analysis☆709Jan 10, 2020Updated 6 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37May 15, 2018Updated 7 years ago
- D-RAT SRC Extract☆12Dec 24, 2016Updated 9 years ago
- Print the strings of encoded printable characters in files☆12Jul 19, 2015Updated 10 years ago
- Web版webshell☆12Jan 27, 2018Updated 8 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24May 1, 2014Updated 11 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆168Jan 15, 2019Updated 7 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 9 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- ☆13Feb 17, 2016Updated 9 years ago
- ☆13Dec 27, 2023Updated 2 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 10 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- !!!不建议使用了,可以使用AuditBeat!!! Linux服务器命令监控辅助脚本,ElasticSearch + Logstash + Kibana + Redis + Auditd☆28Apr 10, 2019Updated 6 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆232Nov 18, 2015Updated 10 years ago
- PSRecon gathers data from a remote Windows host using PowerShell (v2 or later), organizes the data into folders, hashes all extracted da…☆491Jul 29, 2017Updated 8 years ago
- Emofishes is a collection of proof-of-concepts that help improve, bypass or detect virtualized execution environments (focusing on the on…☆15Jan 28, 2023Updated 3 years ago
- An environment for comprehensive, automated analysis of web-based exploits, based on Cuckoo sandbox.☆124Aug 10, 2015Updated 10 years ago
- DOOM是在thorn上实现的分布式任务分发的ip端口漏洞扫描器☆136Dec 1, 2015Updated 10 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago