isaudits / docker-gvmLinks
Docker container stack for GVM / OpenVAS
☆48Updated 2 years ago
Alternatives and similar repositories for docker-gvm
Users that are interested in docker-gvm are comparing it to the libraries listed below
Sorting:
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Updated last year
- Docker Image packaging for OpenCVE☆48Updated 7 months ago
- Command line tool designed to set up, start and maintain Clear NDR installation.☆22Updated last week
- Our collection of Wazuh detection rules for our Offense Lab☆14Updated 3 years ago
- Nessus Scanner Docker Image☆59Updated 3 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated last year
- collector/runner☆65Updated 3 months ago
- Greenbone Vulnerability Management Containers☆88Updated last year
- Dockerfiles for security tools☆51Updated 7 months ago
- A simple Python script that calls SSL Labs API to do SSL testings on servers and create a report in html.☆29Updated this week
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- VulsRepo is visualized based on the json report output in vuls.☆35Updated 3 years ago
- Look into EDR events from network☆23Updated last month
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆169Updated 3 years ago
- CentOS Bench for Security is a script that implements checks which follows the CIS CentOS Linux 7 Benchmark.☆41Updated 6 years ago
- Manageable report from lynis text output, in various formats.☆74Updated 2 months ago
- Alert notification plugin for Graylog to generate log messages from alerts☆25Updated 2 weeks ago
- Tools for Wazuh by Juan C. Tello☆14Updated 3 years ago
- Simple DNS logging server☆18Updated 3 years ago
- Install open-source software from source to focus on Zero Trust Network principles, enhancing security for existing applications, and dep…☆67Updated 5 months ago
- Wazuh - Puppet module☆49Updated this week
- Ansible role to detect Log4Shell exploitation attempts☆18Updated 3 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- Greenbone Vulnerability Management for Docker - based on git source code.☆39Updated last year
- scan & visualize subnets☆70Updated 8 years ago
- Threat Intelligence with Elastic - Minemeld integration with Elasticsearch☆19Updated 4 years ago
- Some resources to facilitate my blog on auditd for security monitoring☆12Updated 2 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆86Updated 3 years ago
- Notus is a vulnerability scanner for creating results from local security checks☆52Updated this week
- Suricata rules for the new critical vulnerabilities☆82Updated 4 years ago