tenable / naslLinks
A parser for NASL.
☆46Updated 2 years ago
Alternatives and similar repositories for nasl
Users that are interested in nasl are comparing it to the libraries listed below
Sorting:
- A documentation generator for NASL.☆18Updated 3 years ago
- NMap XML decoding for logstash☆28Updated 2 years ago
- OpenVAS connector for versions 6, 7, 8 and 9☆80Updated 3 years ago
- Snort rules☆35Updated 6 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- A dsniff project using bro☆11Updated 9 years ago
- ☆39Updated last year
- A repository for OSSEC rules and decoders☆53Updated 2 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- ☆57Updated last year
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- IronBee Rules☆18Updated 11 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago
- ☆20Updated last year
- A static analysis framework for NASL.☆14Updated 2 years ago
- 🔓 Yet Another S3 Bucket Leak☆29Updated 7 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- A malware/botnet analysis framework written in Ruby.☆197Updated 2 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 11 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 9 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago