google / tsunami-security-scanner-plugins
This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
☆904Updated this week
Alternatives and similar repositories for tsunami-security-scanner-plugins:
Users that are interested in tsunami-security-scanner-plugins are comparing it to the libraries listed below
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,350Updated last week
- Guidance for mitigation web shells. #nsacyber☆972Updated last year
- Attack Detection☆1,349Updated 2 years ago
- Vulncode-DB project☆575Updated 3 years ago
- ☆2,657Updated 11 months ago
- Vulmap Online Local Vulnerability Scanners Project☆962Updated last year
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆458Updated last year
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,318Updated 4 months ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,341Updated 10 months ago
- Pattern recognition for hosts, services, and content☆687Updated last week
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,825Updated 8 months ago
- Proof of Concepts☆1,231Updated 3 months ago
- Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.☆1,484Updated 11 months ago
- ☆972Updated last month
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,250Updated last year
- Utilities for MITRE™ ATT&CK☆1,018Updated 8 months ago
- Create actionable data from your Vulnerability Scans☆1,365Updated 2 years ago
- An Active Defense and EDR software to empower Blue Teams☆1,255Updated last year
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆535Updated 11 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,420Updated 2 weeks ago
- Advanced Honeypot framework.☆1,239Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 7 months ago
- NVD, Ubuntu, Alpine☆420Updated this week
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆780Updated 4 years ago
- A Suricata based IDS/IPS/NSM distro☆1,507Updated 6 months ago
- Defences against Cobalt Strike☆1,284Updated 2 years ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,090Updated 3 weeks ago
- YARA signature and IOC database for my scanners and tools☆2,554Updated this week
- Open source vulnerability DB and triage service.☆1,741Updated this week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,260Updated 3 weeks ago