xme / pfauditLinks
pfSense Configuration Auditing Script
☆12Updated 4 years ago
Alternatives and similar repositories for pfaudit
Users that are interested in pfaudit are comparing it to the libraries listed below
Sorting:
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- ☆15Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- ioc2rpz is a place where threat intelligence meets DNS.☆110Updated 6 months ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆16Updated 3 years ago
- ☆52Updated 5 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Fortigate Log Parser☆16Updated last year
- Ansible playbook automation for pfelk☆23Updated 3 years ago
- Small bash script for OpenVAS installation and management☆21Updated 6 years ago
- scan & visualize subnets☆71Updated 8 years ago
- Files related to my Graylog home lab setup☆25Updated 7 months ago
- Example configuration files for Logstash☆44Updated 5 years ago
- BRO/Zeek IDS content pack contains pipeline rules, a stream, a dashboard displaying interesting activity, and a syslog tcp input to captu…☆20Updated 5 years ago
- ☆23Updated 6 years ago
- Convert OpenVPN profiles to an APC file that can be imported into a Sophos/Astaro UTM☆14Updated 9 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 5 years ago
- Manageable report from lynis text output, in various formats.☆75Updated 4 months ago
- OwlH Master API Web User Interface☆12Updated last year
- Recursively validate a starting directory of file contents to identify changes, corrupt data☆37Updated 5 years ago
- How to write OSSEC alerts into Graylog☆12Updated 8 years ago
- Cerberus is a toolkit to receive, parse, process and automate abuse reports handling received by ISP or hosting providers.☆15Updated 6 years ago
- Passwords of SSH Intruders Transferred to Text☆157Updated last year
- Web Frontend for testssl.sh☆133Updated 8 years ago
- Mattermost - Shodan Slash command☆31Updated 8 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- A quick way to perform a bulk whois query. Utilizes Team Cymru's service. Requires netcat.☆11Updated 13 years ago