Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch
☆14Aug 18, 2023Updated 2 years ago
Alternatives and similar repositories for gvm-logstash
Users that are interested in gvm-logstash are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Greenbone Vulnerability Management (GVM) and OpenVAS Scanner for Docker!☆24May 25, 2022Updated 3 years ago
- ☆15May 10, 2020Updated 5 years ago
- Parses Sonicwall rules, groups, and services from settings export.☆16Nov 9, 2022Updated 3 years ago
- Vulnerability Data in ES☆143Oct 17, 2017Updated 8 years ago
- Enlightenment e16 themes☆25Dec 20, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- CLI Search for Security Operators of MITRE ATT&CK URLs☆17Jan 5, 2023Updated 3 years ago
- Hacking Tool!! This Tools help you with ethical hacking, Social media hack, phone info, Gmail attack, phone number attack, user discovery…☆17Dec 23, 2024Updated last year
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Aug 18, 2023Updated 2 years ago
- A web application which acts as an IoT device when loaded in a smart phone browser. The data from the sensors are then used for Anomaly d…☆11Feb 4, 2021Updated 5 years ago
- Greenbone Vulnerability Management Docker Image with OpenVAS☆246Nov 25, 2024Updated last year
- A tool for folks who `git clone` first and ask questions later☆67Sep 12, 2025Updated 6 months ago
- Possible Phone Hacking - Hack Civs Phones through Phone Hackers (or your desired required item). Qbox, QBCore, ox_inventory/ qb_inventory…☆16Jan 18, 2025Updated last year
- Unlock level without hassle in Candy Crush Saga☆22Sep 5, 2017Updated 8 years ago
- Utility Bash shell scripts I've written - typically these will run on Unix, Linux, OS X, and Cygwin☆16Jan 27, 2026Updated last month
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Proxy wired iOS internet connection and only allow cert server communication for safe agent signing☆13Aug 3, 2023Updated 2 years ago
- USSDParser is an Android service that allows intercepting and receiving USSD text messages results and re-broadcasting them for any liste…☆10Sep 30, 2020Updated 5 years ago
- Post-Exploitation Tool to Steal MySQL Data, and with persistence extract all data from MySQL table every time that Windows are opened wit…☆14Apr 2, 2023Updated 2 years ago
- Kidash: A GrimoireLab tool & library to manage Kibana/Kibiter visualizations and dashboards☆13Mar 3, 2026Updated 3 weeks ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- Tutorial covering how to discover DLLs for Hijacking and how to create proxy DLLS using Microsoft Teams as an example☆16Apr 7, 2021Updated 4 years ago
- Curses-based tools for Zsh, e.g. multi-word history searcher☆14Apr 15, 2023Updated 2 years ago
- Tools that i have gatherd and study to see how thay work and learned why theses tools execute there attacks. I started to have the intres…☆11Dec 25, 2020Updated 5 years ago
- Parses Apache 2.4 dumpio logs☆10Nov 1, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Extract messages from an iMessage database from iOS 8☆13Apr 10, 2017Updated 8 years ago
- RDP POC☆19Jun 1, 2019Updated 6 years ago
- Dataset Release for Phone Number Entity capture task☆14Sep 2, 2022Updated 3 years ago
- Demo iPhone app for the HiJack device☆35Aug 21, 2011Updated 14 years ago
- OpenControl Database☆11Jan 5, 2023Updated 3 years ago
- Mission: Create a mobile application that can keep track of a user. When the user logs into to the system, the user's image will be captu…☆14Sep 26, 2018Updated 7 years ago
- A dns server that use to hijack other dns request in a wifi network for redirect to your custem http server ..☆20Jun 25, 2015Updated 10 years ago
- class-dump using private-dumper iOS 7 Private Header☆19Jan 20, 2014Updated 12 years ago
- ☆19Dec 12, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- 📡 GPS satellite tracker - which GPS satellites are currently visible above a given location on earth?☆16Nov 6, 2019Updated 6 years ago
- https://www.facebook.com/hackaphone Information for hackers: Download the app: http://mod-color.com/download/preregister.apk Allow inst…☆12Sep 11, 2016Updated 9 years ago
- Ansible role to install/configure Chrony☆13Mar 19, 2026Updated last week
- Example project announcing mDNS/Avahi services over dbus on resin.io☆17May 7, 2017Updated 8 years ago
- Obsidian plugin for GTD workflow, badge projects with no next step.☆18Apr 23, 2024Updated last year
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Dec 9, 2025Updated 3 months ago
- Simple converter script for Day One2: JSON -> Pandoc Markdown with metadata.☆10Feb 20, 2022Updated 4 years ago