cisagov / saverLinks
Save scan results to a database
☆12Updated this week
Alternatives and similar repositories for saver
Users that are interested in saver are comparing it to the libraries listed below
Sorting:
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Updated last month
- Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses☆13Updated last month
- Automated pshtt, trustymail, and sslyze scanning☆27Updated last week
- Certbot container that stores its configuration in an AWS S3 bucket☆15Updated last week
- Welcome to the NCC Group Threat Intelligence Alert repo, here you will find the alerts which we have raised to our customers regarding in…☆25Updated 2 years ago
- A systemd-enabled Kali Linux Docker image, in the spirit of geerlingguy/docker-debian11-ansible.☆15Updated 7 months ago
- This repository contains a Python client for interfacing with the [crt.sh](https://crt.sh/) website, allowing users to retrieve informati…☆14Updated 10 months ago
- Virtual machines that are set up with a variety of known vulnerabilities.☆15Updated 3 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated 2 years ago
- CyHy Dashboard☆17Updated this week
- New version of the buildkit repository☆9Updated 3 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last week
- ☆15Updated 3 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- Visualize your Terraform files☆34Updated 4 years ago
- DEPRECATED: A set of utilities for converting and working with compliance data for viewing in the heimdall applications☆35Updated 3 years ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Updated last week
- ☆21Updated 2 years ago
- ☆15Updated 2 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- A few quick recipes for those that do not have much time during the day☆22Updated 8 months ago
- Python script which takes internal asset inventory at scale using zmap. Outputs to CSV.☆21Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆28Updated this week
- Pure Honeypots with an automated bash script☆20Updated 3 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- vyos based isolation of networks☆10Updated 4 years ago
- Collection of exploits that were verified by an automated system☆13Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆34Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago