tenable / naslLinks
A parser for NASL.
☆45Updated 2 years ago
Alternatives and similar repositories for nasl
Users that are interested in nasl are comparing it to the libraries listed below
Sorting:
- A documentation generator for NASL.☆18Updated 3 years ago
- OpenVAS connector for versions 6, 7, 8 and 9☆80Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- NMap XML decoding for logstash☆28Updated 2 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- ☆20Updated last year
- A dsniff project using bro☆11Updated 9 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- Snort rules☆35Updated 6 years ago
- ☆39Updated last year
- A malware/botnet analysis framework written in Ruby.☆196Updated 2 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆153Updated 8 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- A static analysis framework for NASL.☆14Updated 2 years ago
- A repository for OSSEC rules and decoders☆55Updated 2 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago
- ☆37Updated 10 years ago
- Signature-free approach library to detect injection and commanding attacks☆96Updated 3 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 11 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 9 years ago
- ☆55Updated last year
- OSSEC Documentation☆137Updated 8 months ago
- Shocker / Docker Breakout PoC☆121Updated 11 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- With the hope that someone finds the data useful, we used to periodically publish an archive of almost all of the non-sensitive vulnerabi…☆96Updated last year