cehkunal / Openvas-AutomationLinks
The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host provided with (IP, SSH Username and SSH Password). This automatically generates the report for further analysis. It can be easily integrated in CI pipeline provided the report analysis has to be done manually. F…
☆15Updated 6 years ago
Alternatives and similar repositories for Openvas-Automation
Users that are interested in Openvas-Automation are comparing it to the libraries listed below
Sorting:
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated 2 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆13Updated 2 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- vPrioritizer enables us to understand the contextualized risk (vPRisk) on asset-vulnerability relationship level across the organization,…☆69Updated 3 months ago
- cve-search is a tool to import CVE (Common Vulnerabilities and Exposures) and CPE (Common Platform Enumeration) into a MongoDB to facilit…☆24Updated 8 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆102Updated 2 weeks ago
- collector/runner☆65Updated last month
- Vulnerability Assessment Module - OpenVas with Elastic stack using VulnWhisperer☆19Updated 6 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 5 years ago
- A Darktrace CLI written in Python☆16Updated 5 years ago
- Threat Mapping Catalogue☆18Updated 4 years ago
- Rapid cybersecurity toolkit based on Elastic in Docker. Designed to quickly build elastic-based environments to analyze and execute threa…☆18Updated 5 years ago
- A Python application to filter and transfer Zeek logs to Elastic/OpenSearch+Humio. This app can also output pure JSON logs to stdout for…☆37Updated 3 years ago
- Check IOC provided by a MISP instance on Suricata events☆18Updated 6 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Bro analyzer that detects Google's QUIC protocol☆10Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- ☆20Updated 5 years ago
- Repository resource threat intelligence for SOC☆10Updated 7 years ago
- Automated daily scan using Nmap and report on the differences☆91Updated 7 years ago
- Advanced Persistent Threat Detection Using Network Analysis☆22Updated 6 years ago
- Globally distributed honeypots and HoneyNets IOCs and file reversing☆16Updated last year
- Jupyter Notebooks and code used for DNS MX mining to identify top email security providers☆56Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- Scout - a Contactless Active Reconnaissance Tool☆55Updated 2 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Updated 7 years ago
- Docker container for datasploit framework☆26Updated 8 years ago
- ☆35Updated 4 years ago
- NMAP NSE script that scans for http(s) server, takes a screenshot of them, and organizes the results into an HTML report.☆27Updated 11 years ago