mikenowak / docker-nessus
Nessus Vulnerability Scanner in a Docker container
☆10Updated 6 years ago
Alternatives and similar repositories for docker-nessus:
Users that are interested in docker-nessus are comparing it to the libraries listed below
- Nessus Vulnerability visualization for the web☆31Updated 9 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- Dockerized cve-search as a web app☆16Updated 7 years ago
- A Yara Lua output script for Suricata☆19Updated 5 years ago
- Carving tool based in Radare2 & Yara☆16Updated 6 years ago
- A series of Bro Scripts created for detection purposes.☆19Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- ☆46Updated 7 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- DockerFiles for Docker Containers☆16Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Gophish Python cli to perform huge phishing campaigns☆40Updated 6 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 6 years ago
- Docker Automated Build for Security Testing Tools☆14Updated 2 years ago
- ☆12Updated 11 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- The repository contains IOCs in CSV format for APT, Cyber Crimes, Malware and Trojan and whatever I found as part of hunting and research☆12Updated 7 years ago
- A Docker container for Moloch based on minimal Debian☆26Updated 9 years ago
- splunk alert script to create resilient tickets☆10Updated 8 years ago
- Yara Dockerfile☆50Updated 2 years ago
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Normalizer for honeypot data.☆45Updated 9 years ago
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Updated 12 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- Repository of Information sharing on threats and indicators☆12Updated 4 years ago
- An easy to grep dump of the NVD database showing only; CVE-ID, CVSS Risk Score, and Summary.☆53Updated 2 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 11 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago