jivoi / ansible-openvasLinks
openVAS with ansible
☆21Updated 10 years ago
Alternatives and similar repositories for ansible-openvas
Users that are interested in ansible-openvas are comparing it to the libraries listed below
Sorting:
- openvpn server configs☆14Updated 9 years ago
- devops scripts☆33Updated 9 years ago
- home! sweet home☆24Updated 6 years ago
- Linux, macOS and Windows Install scripts for cnquery & cnspec☆84Updated last week
- site source jivoi.github.io☆22Updated 3 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- Offensive Infrastructure with Modern Technologies☆91Updated 5 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆20Updated 3 years ago
- ☆14Updated 8 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 4 years ago
- Port scanning and domain utility.☆29Updated 8 years ago
- Ansible Playbooks for Security Automation with Ansible2 book☆102Updated 7 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 9 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- A SIEM inspired by HECTOR, built on Django.☆27Updated 6 years ago
- Use Tor for anonymous scanning with nmap☆86Updated 10 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 8 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 7 years ago
- only for 31337☆24Updated 9 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- Intrusion Prevention System (IPS) for Secure Shell (SSH)☆54Updated 12 years ago
- Python 3 script for interacting with Shodan API☆20Updated last year
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Updated 7 years ago
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 8 years ago
- Guidelines for writing secure code for Python developers.☆22Updated 8 years ago
- Shodan.io Command Line Interface☆43Updated 4 years ago
- IDS/IPS malware download evasion☆15Updated 6 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- AWS security scanning checks in a container☆13Updated 9 years ago