RedHatProductSecurity / vulnerability-detection-scripts
Vulnerability detection scripts for Red Hat Enterprise Linux
☆19Updated 2 years ago
Alternatives and similar repositories for vulnerability-detection-scripts
Users that are interested in vulnerability-detection-scripts are comparing it to the libraries listed below
Sorting:
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 4 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Mixeway is security orchestrator for vulnerability scanners which enable easy plug in integration with CICD pipelines. MixewayBackend pro…☆16Updated 7 months ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆55Updated 5 months ago
- Understand OVAL results in a blink of an eye☆35Updated 2 years ago
- ☆37Updated last year
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- Application and service identification rules for Suricata☆18Updated 2 years ago
- A repository for OSSEC rules and decoders☆54Updated last year
- Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.☆22Updated 11 months ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 5 months ago
- SysFlow documentation and issues tracker☆46Updated 7 months ago
- Try to detect HTTP desync attack (https://portswigger.net/blog/http-desync-attacks-request-smuggling-reborn)☆12Updated 5 years ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated 3 months ago
- Application and service identification rules for Suricata☆29Updated 2 years ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Updated 2 years ago
- Community-based CybergON-powered Suricata rules☆12Updated 2 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago
- Some tools based on docker☆24Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- ☆10Updated 5 years ago
- A parser for NASL.☆45Updated 2 years ago
- ☆16Updated 7 years ago
- RPM/SWID vulnerability scanner☆23Updated 4 years ago
- Plugin packages that provide custom visualizations and analytics capabilities to Trisul Network Analytics.☆16Updated last week
- docker vulnerability analysis☆50Updated 9 years ago