opencve / opencve-dockerLinks
Docker Image packaging for OpenCVE
☆47Updated 9 months ago
Alternatives and similar repositories for opencve-docker
Users that are interested in opencve-docker are comparing it to the libraries listed below
Sorting:
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 6 months ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated 2 weeks ago
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆174Updated 3 years ago
- Audit Windows Security with best Practice☆185Updated 11 months ago
- Nessus Audit files☆33Updated 2 years ago
- ☆57Updated this week
- Mirror - CIS Benchamarks☆41Updated 4 years ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 2 years ago
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆94Updated 3 years ago
- ☆43Updated 2 years ago
- ☆98Updated 3 years ago
- Tools for fast matched Ex0 pattern in huge log files☆26Updated 2 years ago
- An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.☆51Updated last year
- collector/runner☆65Updated 5 months ago
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆68Updated 4 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆15Updated 3 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- ☆80Updated 2 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆53Updated 3 years ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆16Updated last year
- Tool to discover external and internal network attack surface☆203Updated last year
- Finding exposed secrets and personal data in GitLab☆199Updated 9 months ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆157Updated 5 months ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆65Updated last year
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- The Wazuh agent for endpoints.☆81Updated last month
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago