Send your nessus compliance and vulnerability scan data to ElasticSearch
☆28Sep 11, 2018Updated 7 years ago
Alternatives and similar repositories for nessus2es
Users that are interested in nessus2es are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- Detect Phishing fetching Certificate Transparency Logs☆21Jan 13, 2021Updated 5 years ago
- SecurityCenter 5 Python scripts☆10Apr 20, 2023Updated 2 years ago
- Create actionable data from your Vulnerability Scans☆1,396Dec 27, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- A Passive DNS backend and collector☆33Jul 16, 2022Updated 3 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 5 years ago
- PwnGRID queries for Joe☆18Nov 12, 2019Updated 6 years ago
- Nessus Cheat Sheet in HTML, PDF, PNG, ADOC☆12Apr 10, 2022Updated 3 years ago
- ☆14Jun 7, 2017Updated 8 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Feb 22, 2011Updated 15 years ago
- Nessus Vulnerability visualization for the web☆31Jan 25, 2016Updated 10 years ago
- Secure URL-friendly unique string ID generator in <8 LOC☆14Updated this week
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Vendor-Neutral Security Tool Automation Controller (over REST)☆28Jun 28, 2019Updated 6 years ago
- Integration for Jira ticket creation from Tenable vulnerability scans☆17Mar 28, 2019Updated 6 years ago
- Learning assembly for linux-x86_64☆13Mar 18, 2016Updated 10 years ago
- A custom Amazon Alexa Skill Kit that can send any spoken command to EventGhost☆20Nov 1, 2019Updated 6 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- A curated list of awesome threat detection and hunting resources☆10Mar 23, 2018Updated 8 years ago
- OWASP Foundation Web Respository☆11May 22, 2023Updated 2 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Graphical interface for @hasan-hasanov's ScoopBox: configure & launch Windows Sandbox.☆18Jun 27, 2022Updated 3 years ago
- Bash script to parse multiple Nmap (.gnmap) exports into various plain-text formats for easy analysis.☆66Mar 6, 2013Updated 13 years ago
- A Pythonic wrapper to MassDNS☆24Mar 21, 2018Updated 8 years ago
- Python script to extract embedded data from binaries generated by SAPIEN Script Packager☆13Mar 20, 2024Updated 2 years ago
- Security Assessment Data Management and Analysis Tool☆38May 6, 2021Updated 4 years ago
- Python script for analyis of the "Trust.csv" file generated by Veil PowerView. Provides graph based analysis and output.☆121Aug 18, 2020Updated 5 years ago
- A small, fast, and efficient offline event log parser, registry reader, pcap file analyzer, IL decompiler (with ICSharpCode), and pagefil…☆18Mar 23, 2014Updated 12 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- Parse .nessus file(s) and shows output in interactive UI☆163Jan 5, 2026Updated 2 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A TCP service multiplexer☆19May 4, 2017Updated 8 years ago
- How to install macOS Big Sur on an Unsupported Mac : Example: MacBook Pro Late 2011☆10Feb 27, 2021Updated 5 years ago
- An MITM based Social Engineering (Phishing)attack POC!☆10Mar 25, 2014Updated 12 years ago
- Proof-of-concept for phishing intelligence in Elastic☆15Apr 30, 2019Updated 6 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 4 years ago
- simple c2 written in python to demonstrate security concepts☆13Sep 17, 2018Updated 7 years ago