google / tsunami-security-scanner-pluginsLinks
This project aims to provide a central repository for many useful Tsunami Security Scanner plugins.
☆991Updated 2 weeks ago
Alternatives and similar repositories for tsunami-security-scanner-plugins
Users that are interested in tsunami-security-scanner-plugins are comparing it to the libraries listed below
Sorting:
- Guidance for mitigation web shells. #nsacyber☆981Updated 2 years ago
- Tsunami is a general purpose network security scanner with an extensible plugin system for detecting high severity vulnerabilities with h…☆8,534Updated 3 weeks ago
- Vulncode-DB project☆577Updated 4 years ago
- ☆2,664Updated last year
- Pattern recognition for hosts, services, and content☆757Updated 3 weeks ago
- Vulmap Online Local Vulnerability Scanners Project☆970Updated 2 years ago
- Attack Detection☆1,363Updated 3 years ago
- A set of tools to work with the feeds (vulnerabilities, CPE dictionary etc.) distributed by National Vulnerability Database (NVD)☆468Updated 2 years ago
- NVD, Ubuntu, Alpine☆449Updated this week
- Zui is a powerful desktop application for exploring and working with data. The official front-end to the Zed lake.☆1,923Updated this week
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆756Updated 2 years ago
- Create actionable data from your Vulnerability Scans☆1,396Updated 3 years ago
- An installable desktop variant of OWASP Threat Dragon☆592Updated last week
- NERVE Continuous Vulnerability Scanner☆457Updated 2 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆491Updated 2 years ago
- Advanced Honeypot framework.☆1,301Updated 2 years ago
- Threat Pursuit Virtual Machine (VM): A fully customizable, open-sourced Windows-based distribution focused on threat intelligence analysi…☆1,302Updated 2 years ago
- A utility to safely generate malicious network traffic patterns and evaluate controls.☆1,349Updated last year
- Red Team K8S Adversary Emulation Based on kubectl☆825Updated 4 years ago
- AttackSurfaceMapper is a tool that aims to automate the reconnaissance process.☆1,398Updated last year
- A tool to hunt for credentials in github wild AKA git*hunt☆297Updated 3 years ago
- Greenbone Vulnerability Manager - The database backend for the Greenbone Community Edition☆347Updated this week
- A Linux Auditd rule set mapped to MITRE's Attack Framework☆824Updated 5 years ago
- Fast Application Layer Scanner☆2,062Updated 2 weeks ago
- Mirror of https://github.com/zeek/zeek☆175Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,614Updated last month
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,435Updated 7 months ago
- Attack Surface Management since before Attack Surface Management was a thing☆658Updated last week
- Proof of Concepts☆1,321Updated last year
- Graph platform for Detection and Response☆702Updated 3 years ago