google / tsunami-security-scanner-pluginsLinks
This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
☆909Updated last week
Alternatives and similar repositories for tsunami-security-scanner-plugins
Users that are interested in tsunami-security-scanner-plugins are comparing it to the libraries listed below
Sorting:
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,417Updated this week
- Guidance for mitigation web shells. #nsacyber☆977Updated 2 years ago
- ☆2,662Updated last year
- Vulncode-DB project☆580Updated 3 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,475Updated last week
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,270Updated 2 years ago
- Open EDR public repository☆2,460Updated last year
- Investigate malicious Windows logon by visualizing and analyzing Windows event log☆2,911Updated last year
- Vulmap Online Local Vulnerability Scanners Project☆967Updated 2 years ago
- Open-source CVE monitoring and alerting platform☆2,036Updated last month
- Attack Detection☆1,360Updated 2 years ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆2,513Updated 11 months ago
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,848Updated this week
- Create actionable data from your Vulnerability Scans☆1,384Updated 2 years ago
- Kaspersky's GReAT KLara☆707Updated 11 months ago
- YARA signature and IOC database for my scanners and tools☆2,659Updated this week
- Digging Deeper....☆3,323Updated this week
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,364Updated last year
- A toolset to make a system look as if it was the victim of an APT attack☆2,610Updated 2 years ago
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆795Updated 4 years ago
- NVD, Ubuntu, Alpine☆433Updated this week
- Proof of Concepts☆1,262Updated 7 months ago
- Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs an…☆2,143Updated this week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,284Updated 5 months ago
- A tool to abuse Exchange services☆2,244Updated last year
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,312Updated last year
- VECTR is a tool that facilitates tracking of your red and blue team testing activities to measure detection and prevention capabilities a…☆1,485Updated last week
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,387Updated 2 weeks ago
- An installable desktop variant of OWASP Threat Dragon☆593Updated 2 weeks ago
- ☆561Updated 2 years ago