google / tsunami-security-scanner-plugins
This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
☆905Updated last week
Alternatives and similar repositories for tsunami-security-scanner-plugins:
Users that are interested in tsunami-security-scanner-plugins are comparing it to the libraries listed below
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,376Updated this week
- Vulmap Online Local Vulnerability Scanners Project☆964Updated 2 years ago
- Vulncode-DB project☆576Updated 3 years ago
- ☆2,658Updated last year
- Guidance for mitigation web shells. #nsacyber☆971Updated last year
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,347Updated 11 months ago
- Create actionable data from your Vulnerability Scans☆1,373Updated 2 years ago
- A pretty sweet vulnerability scanner☆4,116Updated 6 months ago
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,327Updated 5 months ago
- NIST Certified SCAP 1.2 toolkit☆1,457Updated this week
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆460Updated last year
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,436Updated last month
- Advanced Honeypot framework.☆1,244Updated last year
- Open EDR public repository☆2,381Updated last year
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆753Updated last year
- ☆978Updated 2 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,079Updated last week
- Easy automated vulnerability scanning, reporting and analysis☆702Updated 5 years ago
- Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition☆305Updated this week
- Pattern recognition for hosts, services, and content☆697Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,510Updated 8 months ago
- NERVE Continuous Vulnerability Scanner☆457Updated last year
- Attack Surface Analyzer can help you analyze your operating system's security configuration for changes during software installation.☆2,808Updated last month
- A tool to hunt for credentials in github wild AKA git*hunt☆294Updated 2 years ago
- Attack Detection☆1,352Updated 2 years ago
- HASSH is a network fingerprinting standard which can be used to identify specific Client and Server SSH implementations. The fingerprints…☆538Updated last year
- Detect Tactics, Techniques & Combat Threats☆2,126Updated 2 months ago
- A tool to abuse Exchange services☆2,214Updated 9 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,266Updated 2 months ago
- An installable desktop variant of OWASP Threat Dragon☆594Updated 4 months ago