ishiDACo / vulsrepo
VulsRepo is visualized based on the json report output in vuls.
☆33Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for vulsrepo
- CVEs <--> Metasploit-Framework modules☆23Updated last month
- Vuls Beater for Elasticsearch - connecting vuls☆17Updated 3 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Updated last year
- Tool to tackle problematic dangling domains in Amazon Web Services.☆13Updated 7 years ago
- whois command implemented by golang with awesome whois servers list☆63Updated last year
- ☆15Updated 2 months ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆43Updated last year
- egrets monitors egress☆45Updated 4 years ago
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆16Updated 5 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆18Updated last month
- Checklist and tools for increasing security of Apache Airflow☆32Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 6 months ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆27Updated 8 months ago
- ☆14Updated last year
- DefectDojo Community Content☆17Updated 3 weeks ago
- Core A2P2V functionality (command line based)☆67Updated 5 months ago
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆25Updated last year
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆80Updated last month
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆31Updated last month
- Serverless, real-time, ClamAV+Yara scanning for your S3 Buckets☆32Updated 5 months ago
- fast, extensible, versatile event router for Suricata's EVE-JSON format☆50Updated 4 months ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- ☆60Updated last year
- Hackers Don't Give A Shit☆15Updated 4 years ago
- Tracing security events in container with BPF☆15Updated 10 months ago
- Security tools report parsers for Faradaysec.com☆50Updated last month
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆65Updated last year