opencve / opencve-dockerLinks
Docker Image packaging for OpenCVE
☆48Updated 11 months ago
Alternatives and similar repositories for opencve-docker
Users that are interested in opencve-docker are comparing it to the libraries listed below
Sorting:
- A distributed nmap / masscan scanning framework complete with scan scheduling, engine pooling, subsequent scan port diff-ing, and an API …☆176Updated 3 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆141Updated 7 months ago
- Mirror - CIS Benchamarks☆41Updated 4 years ago
- Nessus Audit files☆33Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated this week
- A Ruleset to enhance detection capabilities of Ossec using Sysmon☆95Updated 3 years ago
- Notus is a vulnerability scanner for creating results from local security checks☆58Updated last week
- Command line tool designed to set up, start and maintain Clear NDR installation.☆29Updated last month
- An Outlook Plugin to report phishing emails easier and provides full integration with GoPhish.☆52Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- Audit Windows Security with best Practice☆186Updated last year
- A tool to assess the compliance of a VMware vSphere environment against the CIS Benchmark.☆55Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 5 months ago
- ☆80Updated 2 years ago
- Docker container for the gophish phishing framework.☆52Updated this week
- collector/runner☆65Updated last month
- Sysmon and wazuh integration with Sigma sysmon rules [updated]☆70Updated 4 years ago
- Our collection of Wazuh detection rules for our Offense Lab☆16Updated 3 years ago
- ☆59Updated this week
- Deploy a small, intentionally insecure, vulnerable Windows Domain for RDP Honeypot fully automatically.☆258Updated 3 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Updated 4 years ago
- Look into EDR events from network☆24Updated 5 months ago
- Lists of affected components and affected apps/vendors by CVE-2021-44228 (aka Log4shell or Log4j RCE). This list is meant as a resource f…☆53Updated 3 years ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆219Updated 3 years ago
- Tool to discover external and internal network attack surface☆203Updated last year
- Citrix Scanner for CVE-2023-3519☆50Updated 2 years ago
- Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228☆151Updated 3 years ago
- Wazuh integration TheHive☆39Updated 2 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 2 years ago