cehkunal / Openvas-Automation
The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host provided with (IP, SSH Username and SSH Password). This automatically generates the report for further analysis. It can be easily integrated in CI pipeline provided the report analysis has to be done manually. F…
☆16Updated 6 years ago
Alternatives and similar repositories for Openvas-Automation:
Users that are interested in Openvas-Automation are comparing it to the libraries listed below
- Automated Static Analysis Framework☆9Updated 3 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆13Updated last year
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Subscriptions to collect Windows Event Logs mapped to the MITRE ATT&CK model☆12Updated 4 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Updated 5 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 4 months ago
- Check IOC provided by a MISP instance on Suricata events☆17Updated 5 years ago
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- ☆14Updated last year
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 7 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- ☆15Updated 3 years ago
- This Risk Rating Calculator is based on OWASP's Risk Rating Methodology☆22Updated 9 months ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- ☆12Updated 6 years ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆25Updated 7 years ago
- Exploit for win10 SMB3.1☆17Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 10 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Threat Feeds, Threat lists, and regular lists of known IP ranges and domains. It updates every 4 hours.☆16Updated 3 years ago
- Manticore's Public Threats Repository☆10Updated 4 years ago
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Audit Powershell and search from known keywords in history #Blueteam☆25Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 4 years ago