RedHatProductSecurity / vulnerability-detection-scriptsLinks
Vulnerability detection scripts for Red Hat Enterprise Linux
☆20Updated 3 years ago
Alternatives and similar repositories for vulnerability-detection-scripts
Users that are interested in vulnerability-detection-scripts are comparing it to the libraries listed below
Sorting:
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 4 years ago
- Vault Exploit Defense☆127Updated last year
- A repository for OSSEC rules and decoders☆54Updated 2 years ago
- ☆188Updated last week
- ☆39Updated last year
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆95Updated last year
- NVD/CVE as JSON files☆122Updated this week
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆139Updated 2 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- A parser for NASL.☆46Updated 3 years ago
- Pattern recognition for hosts, services, and content☆14Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- bpflock - eBPF driven security for locking and auditing Linux machines☆150Updated 3 years ago
- A simple, self-contained regression test suite for the Linux Kernel's audit subsystem☆23Updated 3 months ago
- SysFlow documentation and issues tracker☆46Updated last year
- Example BPF program with LSM hooks☆34Updated 4 years ago
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- Capsule8: open-source cloud-native behavioral security monitoring☆33Updated 7 years ago
- A multi-purpose, modular medium-interaction honeypot based on Twisted.☆19Updated 4 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 6 years ago
- censors pose a threat to the entire Internet☆140Updated 4 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 5 years ago
- Linux Kernel Runtime Integrity with eBPF☆183Updated 2 years ago
- Request Smuggling Firewall☆52Updated 5 years ago
- ☆59Updated last year
- Next generation !☆68Updated 4 years ago
- 📕NVD Database☆111Updated last week
- Community-based CybergON-powered Suricata rules☆12Updated 3 years ago
- ☆41Updated 7 years ago
- docker vulnerability analysis☆50Updated 9 years ago