ishiDACo / vulsrepo
VulsRepo is visualized based on the json report output in vuls.
☆36Updated 3 years ago
Alternatives and similar repositories for vulsrepo:
Users that are interested in vulsrepo are comparing it to the libraries listed below
- ☆16Updated last month
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated last year
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆46Updated last year
- CVEs <--> Metasploit-Framework modules☆23Updated last week
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆17Updated 6 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- ☆15Updated 3 years ago
- Build a local copy of Security Tracker. Notify via E-mail/Slack if there is an update.☆140Updated last week
- Build a local copy of OVAL. Server mode for easy querying.☆90Updated last week
- Easy setup tool for Vuls☆73Updated 6 months ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆18Updated last week
- Core A2P2V functionality (command line based)☆67Updated 10 months ago
- whois command implemented by golang with awesome whois servers list☆63Updated last year
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆25Updated last year
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- ☆14Updated last year
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 3 months ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆15Updated last year
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14Updated last year
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆69Updated 2 years ago
- Measures the effectiveness of your Web Application Firewall (WAF)☆78Updated last year
- Kestrel Jupyter Notebook Kernel☆9Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Updated 4 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- CERTITUDE - A python package to classify malicious URLs☆20Updated 2 years ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆24Updated 3 years ago
- Dependency Combobulator☆93Updated last year