tenable / nasl
A parser for NASL.
☆44Updated 2 years ago
Alternatives and similar repositories for nasl:
Users that are interested in nasl are comparing it to the libraries listed below
- A documentation generator for NASL.☆17Updated 2 years ago
- A static analysis framework for NASL.☆14Updated 2 years ago
- Custom Nessus Plugins☆17Updated 11 years ago
- Snort rules☆35Updated 6 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆72Updated 7 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆151Updated 7 years ago
- OpenVAS connector for versions 6, 7, 8 and 9☆80Updated 2 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆32Updated 4 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- ☆38Updated last year
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- ☆20Updated last year
- NMap XML decoding for logstash☆28Updated 2 years ago
- This is the C version of the StratosphereLinuxIPS. It is mainly used for integration with Snort and other IDSs.☆12Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆42Updated 8 years ago
- BSidesCBR CTF docker compose files☆69Updated 4 years ago
- Automated SonarQube☆73Updated 5 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 6 years ago
- Ruby interface to cirt.net default passwords database☆20Updated 13 years ago
- The python client of 360 Netlab whois database☆14Updated 6 years ago
- Tests for different parsers from Ruby, Python, .NET, PHP, Perl, Java☆56Updated 8 years ago
- Simple Python bindings for the Hyperscan project.☆20Updated 8 years ago
- Memcache hacking tool.☆47Updated 7 years ago
- DoS PoC's for SAP products☆50Updated 7 years ago
- IronBee Rules☆19Updated 11 years ago
- Application and service identification rules for Suricata☆29Updated 2 years ago
- ☆37Updated 9 years ago
- ☆46Updated 7 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 9 years ago