opencve / opencve-dockerLinks
Docker Image packaging for OpenCVE
☆48Updated last year
Alternatives and similar repositories for opencve-docker
Users that are interested in opencve-docker are comparing it to the libraries listed below
Sorting:
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆181Updated 4 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 11 months ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆19Updated 2 years ago
- Mirror - CIS Benchamarks☆44Updated 5 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆18Updated 3 years ago
- Database Driven DNS Server with a Web UI☆244Updated 2 years ago
- Command line tool designed to set up, start and maintain Clear NDR installation.☆31Updated this week
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆166Updated this week
- Audit Windows Security with best Practice☆192Updated last year
- Nessus Audit files☆32Updated 3 years ago
- ☆61Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 3 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆163Updated 10 months ago
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- Ansible role to install auditbeat for security monitoring. (Ruleset included)☆16Updated 2 years ago
- ☆44Updated 3 years ago
- Official documentation for TheHive Project applications☆21Updated 2 years ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆53Updated 4 years ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆43Updated last month
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆156Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 9 months ago
- ☆22Updated last month
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Useful scripts for those administering Wazuh☆91Updated last month
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- Docker container for the gophish phishing framework.☆52Updated last month
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- Tools for fast matched Ex0 pattern in huge log files☆26Updated 3 years ago