danitfk / VulnWhisperer-StackLinks
VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)
☆13Updated 7 years ago
Alternatives and similar repositories for VulnWhisperer-Stack
Users that are interested in VulnWhisperer-Stack are comparing it to the libraries listed below
Sorting:
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 7 years ago
- open-source intelligence gathering for SIEMs <3☆37Updated 8 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆33Updated 5 years ago
- ☆21Updated 5 years ago
- A collection of awesome software, libraries, documents, books, resources and cools stuffs about security.☆25Updated 9 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 8 years ago
- Bluewall is a firewall framework designed for offensive and defensive cyber professionals.☆106Updated 6 years ago
- The Fastest way to consume Threat Intel☆26Updated 3 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- Combining OSINT sources in Elastic Stack☆78Updated 5 years ago
- Security Onion Elastic Stack☆46Updated 5 years ago
- A few scripts I put together for testing purposes and to automate a few capabilities while doing IR. These scripts are also part of my bl…☆56Updated 8 years ago
- Presentation Slides and Video links☆32Updated 4 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆65Updated 6 years ago
- Distributed Honeypot☆63Updated 7 years ago
- A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for t…☆15Updated 9 years ago
- Check if a IP is from tor or is a malicious proxy☆57Updated 5 years ago
- Tools for the Computer Incident Response Team☆150Updated 8 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Updated 9 years ago
- A toolkit for Security Researchers☆127Updated 6 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆67Updated 7 years ago
- Maltego CaseFile entities for information security investigations, malware analysis and incident response☆67Updated 8 years ago
- Nessus Vulnerability visualization for the web☆31Updated 10 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Updated 6 years ago
- A curated list of tools for incident response☆20Updated 6 years ago
- Real Time Threat Monitoring Tool☆114Updated 3 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 6 years ago
- Simple REST-style web service for the CVE searching☆97Updated 2 years ago
- This is my path to OSCP☆11Updated 7 years ago