stevegrubb / security-assessor
This is a set of scripts that scan a Linux system looking for security and robustness problems.
☆16Updated 4 months ago
Related projects: ⓘ
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 7 years ago
- ☆11Updated 3 years ago
- Host files with DNS☆32Updated 8 years ago
- ☆27Updated this week
- Mass DNS resolution tool☆36Updated 3 years ago
- ☆12Updated this week
- CVE-Search Management Tools - Tools that might be useful for management purposes☆22Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- Passive Bitcoin Project☆10Updated 9 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆10Updated 9 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 3 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 9 years ago
- ☆24Updated 4 years ago
- ☆30Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 9 years ago
- ☆42Updated this week
- Ossec cookbook for Chef, with secure & automated key management☆21Updated 11 years ago
- A List of InfoSec Resources☆10Updated 10 years ago
- ☆28Updated this week
- Repository for Security Workshop content☆20Updated 7 years ago
- Simple (web-) application vulnerability management system☆21Updated 10 years ago
- Fire and forget password cracking and complexity analysis.☆35Updated 8 years ago
- ☆10Updated 7 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆43Updated 10 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21Updated 10 years ago
- A firewall penetration testing tool suite.☆11Updated 7 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Updated 9 years ago
- Extract, defang, resolve names and IPs from text☆22Updated 8 months ago
- Tools for inspecting disk images☆25Updated 5 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆30Updated 6 years ago