isaudits / docker-gvmLinks
Docker container stack for GVM / OpenVAS
☆47Updated 2 years ago
Alternatives and similar repositories for docker-gvm
Users that are interested in docker-gvm are comparing it to the libraries listed below
Sorting:
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆16Updated 2 years ago
- Database Driven DNS Server with a Web UI☆244Updated last year
- Docker Image packaging for OpenCVE☆48Updated last year
- Greenbone Vulnerability Management Docker Image with OpenVAS☆248Updated last year
- Manageable report from lynis text output, in various formats.☆78Updated 9 months ago
- Our collection of Wazuh detection rules for our Offense Lab☆17Updated 3 years ago
- Greenbone Vulnerability Management for Docker - based on git source code.☆39Updated 2 years ago
- Nessus Scanner Docker Image☆59Updated 4 years ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆179Updated 3 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated 2 weeks ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Greenbone Vulnerability Management Containers☆88Updated 2 years ago
- scan & visualize subnets☆73Updated 8 years ago
- Ansible playbook automation for pfelk☆23Updated 3 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Updated 4 years ago
- Wazuh - Splunk App☆56Updated last year
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated 3 weeks ago
- CentOS Bench for Security is a script that implements checks which follows the CIS CentOS Linux 7 Benchmark.☆40Updated 7 years ago
- Finding exposed secrets and personal data in GitLab☆202Updated last year
- Tools for Wazuh by Juan C. Tello☆15Updated 3 years ago
- Auditing Script based on CIS-BENCHMARK CENTOS 8☆44Updated 3 months ago
- Suricata inside a container using Docker☆28Updated 2 years ago
- Command line tool designed to set up, start and maintain Clear NDR installation.☆31Updated 2 weeks ago
- collector/runner☆64Updated 4 months ago
- A firewall management system.☆92Updated 8 months ago
- Docker configurations for TheHive, Cortex and 3rd party tools☆128Updated 3 years ago
- Install open-source software from source to focus on Zero Trust Network principles, enhancing security for existing applications, and dep…☆69Updated 2 weeks ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- Collection of Suricata rule sets that I use modified to my environments.☆40Updated 5 years ago
- Elasticsearch for Offensive Security☆140Updated 5 years ago