Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer
☆19Jun 11, 2019Updated 6 years ago
Alternatives and similar repositories for Vuln_Mod
Users that are interested in Vuln_Mod are comparing it to the libraries listed below
Sorting:
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Nov 16, 2023Updated 2 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19May 11, 2021Updated 4 years ago
- Parse wazuh[HIDS] alerts into ECS mapping using Filebeat☆27Jul 21, 2020Updated 5 years ago
- Quickly generate suricata rules for IOCs☆28Apr 30, 2021Updated 4 years ago
- webpwn3r ======== WebPwn3r - Web Applications Security Scanner. By Ebrahim Hegazy - @Zigoo0 Thanks: @lnxg33k, @dia2diab @Aelhemily, @o…☆28Jan 11, 2019Updated 7 years ago
- Elastic Beat for fetching and shipping Office 365 audit events☆67Sep 9, 2020Updated 5 years ago
- A class validation and transformation library, to ensure secure data structures in Python.☆10May 16, 2024Updated last year
- A Sigma to Wazuh / OSSEC converter including a generated Windows Sysmon ruleset☆38Jun 8, 2020Updated 5 years ago
- Configuring the Suricata IDS to detect DoS attacks by adding custom rule file.☆42May 8, 2020Updated 5 years ago
- Mitre ATT&CK and Suricata Rules Automation with AI & LLM☆14Sep 28, 2024Updated last year
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14May 16, 2024Updated last year
- ☆11Aug 31, 2019Updated 6 years ago
- Cape Town BSides Capture the Flag by Nclose https://bsidescapetown.co.za/☆12Dec 20, 2019Updated 6 years ago
- Repository of creating different example suricata data sets☆37Jan 2, 2019Updated 7 years ago
- Wazuh integration TheHive☆41Feb 21, 2023Updated 3 years ago
- Suricata IDS/IPS log analytics using the Elastic Stack.☆240Jul 28, 2021Updated 4 years ago
- Transform Visualization for Kibana☆42Aug 30, 2018Updated 7 years ago
- PowerShell Module for Infoblox☆12Jun 28, 2015Updated 10 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆39Aug 18, 2022Updated 3 years ago
- ☆22Nov 22, 2025Updated 3 months ago
- netbeacon - monitoring your network capture, NIDS or network analysis process☆19Oct 26, 2013Updated 12 years ago
- Wireshark dissector for GE-FANUC Service Request Transfer Protocol☆11Jan 7, 2023Updated 3 years ago
- ☆15Sep 7, 2025Updated 5 months ago
- Wafid allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆10Oct 19, 2020Updated 5 years ago
- Sample data generator for the Splunk for Palo Alto Networks app.☆12Sep 25, 2016Updated 9 years ago
- golang package to provide lightweight internal pub/sub for goroutines☆29Jan 23, 2014Updated 12 years ago
- Ansible playbook for installing MineMeld on Linux☆47Mar 18, 2021Updated 4 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- ☆11Jan 5, 2022Updated 4 years ago
- ocpjbod is an enclosure management tool that controls some OCP storage enclosure, like Open Vault (Knox).☆12Oct 15, 2018Updated 7 years ago
- Run Graphite with Docker☆10Jan 25, 2019Updated 7 years ago
- Active Response plugin. Osquery to execute wazuh/ossec active response plugins. You can write your own plugins, easy to plug☆11Jun 20, 2020Updated 5 years ago
- Huntress API☆11May 26, 2022Updated 3 years ago
- Code used for Medium Article☆12May 14, 2020Updated 5 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Jun 1, 2015Updated 10 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- jQuery-based Json to html pretty printer☆26Jun 15, 2012Updated 13 years ago