tenable / naslLinks
A parser for NASL.
☆45Updated 2 years ago
Alternatives and similar repositories for nasl
Users that are interested in nasl are comparing it to the libraries listed below
Sorting:
- A documentation generator for NASL.☆18Updated 3 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- OpenVAS connector for versions 6, 7, 8 and 9☆80Updated 3 years ago
- ☆38Updated last year
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- NMap XML decoding for logstash☆28Updated 2 years ago
- Snort rules☆35Updated 6 years ago
- ☆37Updated 10 years ago
- ☆20Updated last year
- Python script to exploit CVE-2015-4852.☆30Updated 9 years ago
- Shocker / Docker Breakout PoC☆121Updated 11 years ago
- Struts Apache 2 based honeypot as well as a detection module for Apache 2 servers☆71Updated 8 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- A repository for OSSEC rules and decoders☆54Updated 2 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆152Updated 8 years ago
- A mysql honeypot, still very very early stage☆21Updated 12 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆80Updated 9 years ago
- Signature-free approach library to detect injection and commanding attacks☆96Updated 3 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- A malware/botnet analysis framework written in Ruby.☆196Updated last year
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 7 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 4 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- This Dockerfile builds a Debian-based Docker container with Metasploit-Framework installed. A quick and easy way to deploy Metasploit on…☆99Updated last year
- Tools for conducting analysis of CVE data in Elasticsearch☆74Updated last month
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- Perl/Python modules for interfacing with Metasploit MSGRPC☆96Updated 5 years ago