mikenowak / docker-nessusLinks
Nessus Vulnerability Scanner in a Docker container
☆10Updated 7 years ago
Alternatives and similar repositories for docker-nessus
Users that are interested in docker-nessus are comparing it to the libraries listed below
Sorting:
- A series of Bro Scripts created for detection purposes.☆19Updated 8 years ago
- Nessus Vulnerability visualization for the web☆31Updated 9 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆55Updated 3 years ago
- A Yara Lua output script for Suricata☆20Updated 6 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- Public rules and samples for various automations through LimaCharlie.io☆13Updated 3 years ago
- Yara Dockerfile☆50Updated 2 years ago
- A defense tool - detect web shells in local directories via md5sum☆32Updated 6 years ago
- ☆46Updated 7 years ago
- Low-interaction Postgres Honeypot☆19Updated last year
- Chef Cookbook which provisions apache+mod_security+owasp-crs☆37Updated 7 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆60Updated last year
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 11 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Updated 7 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 5 years ago
- Community-based integrated malware identification system☆82Updated 2 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Updated 8 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Updated 8 years ago
- little scripts created during my time as a pentetration tester☆31Updated 13 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 6 years ago
- CVE-2016-2776☆27Updated 8 years ago
- DockerFiles for Docker Containers☆16Updated 8 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- WStalker: an easy proxy☆25Updated 5 years ago