xme / pfauditLinks
pfSense Configuration Auditing Script
☆12Updated 4 years ago
Alternatives and similar repositories for pfaudit
Users that are interested in pfaudit are comparing it to the libraries listed below
Sorting:
- ioc2rpz is a place where threat intelligence meets DNS.☆110Updated 6 months ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated last week
- ☆23Updated 6 years ago
- Ansible playbook automation for pfelk☆23Updated 3 years ago
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- Files related to my Graylog home lab setup☆25Updated 8 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Updated 13 years ago
- OwlH Master API Web User Interface☆12Updated last year
- ☆15Updated 6 years ago
- ☆52Updated 5 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- Selective DNS proxy forwarding based on DNS threat blocking providers intelligence.☆56Updated 7 years ago
- automate your MISP installs☆68Updated 5 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Web Frontend for testssl.sh☆133Updated 8 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Corelight-Ansible-Roles are a collection of Ansible Roles and playbooks that install, configure, run and manage a variety of Corelight, S…☆16Updated 4 years ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆19Updated 5 years ago
- Docker files for Security Onion☆42Updated 4 years ago
- This TA takes Suricata5 data from your port mirrored Suricata server and makes it readable within Splunk. See Cheatsheets on how to setup…☆15Updated 4 years ago
- Example Suricata rules implementing some of my detection tactics☆21Updated 2 years ago
- Defensomania is a security monitoring and incident response card game.☆63Updated 2 years ago
- Example configuration files for Logstash☆44Updated 5 years ago
- The Artillery Project is an open-source blue team tool designed to protect Linux and Windows operating systems through multiple methods.☆11Updated 6 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Updated 8 years ago
- 🤖 Daily updated translation maps for T-Pot☆22Updated last year