alb-uss / SECMONLinks
SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.
โ262Updated 3 years ago
Alternatives and similar repositories for SECMON
Users that are interested in SECMON are comparing it to the libraries listed below
Sorting:
- Pwnspoof repositoryโ264Updated 2 years ago
- ๐งฎ An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessmentโ163Updated 4 years ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.โ453Updated last year
- Shodan Monitoring integration for TheHive.โ130Updated last year
- Tool to discover external and internal network attack surfaceโ203Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports fโฆโ142Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnetโ192Updated last year
- PatrowlHears - Vulnerability Intelligence Center / Exploitsโ166Updated last week
- Collection of penetration test reports and pentest report templates. Published by the the best security companies in the world.โ277Updated this week
- Wazuh integration TheHiveโ41Updated 2 years ago
- AWS, Azure, Alibaba and Google bucket scannerโ174Updated 2 years ago
- Repository resource for threat hunterโ158Updated 7 years ago
- A modular OSINT honeypot for blue teamersโ340Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UIโ163Updated last month
- VMC: a Scalable, Open Source and Free Vulnerability Management Platformโ92Updated last year
- Newly registered Domain Monitoring to detect phishing and brand impersonation with subdomain enumeration and source code scrapingโ63Updated 3 months ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.โ41Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.โ152Updated 4 years ago
- Useful resources about phishing email analysisโ86Updated last year
- An open-source self-hosted purple team management web application.โ302Updated 2 weeks ago
- Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)โ211Updated 2 years ago
- Slides for my conference talksโ46Updated 2 years ago
- For pentesters who don't wanna leave their terminals.โ183Updated 4 years ago
- Audit Windows Security with best Practiceโ192Updated last year
- OpenVAS Reporting: Convert OpenVAS XML report files to reportsโ159Updated last month
- A semi-curated list of Security Feedsโ144Updated 3 years ago
- With EmailAnalyzer you can analyze your suspicious emails. You can extract headers, links, and hashes from the .eml file and you can geneโฆโ288Updated 2 years ago
- ๐ก๏ธ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.โ12Updated 6 years ago
- Nightingale Docker for Pentesters is a comprehensive Dockerized environment tailored for penetration testing and vulnerability assessmentโฆโ297Updated last week
- Some Threat Hunting queries useful for blue teamersโ131Updated 3 years ago