Ar0xA / nessus2esLinks
Send your nessus compliance and vulnerability scan data to ElasticSearch
☆28Updated 6 years ago
Alternatives and similar repositories for nessus2es
Users that are interested in nessus2es are comparing it to the libraries listed below
Sorting:
- A collection of hunting and blue team scripts. Mostly others, some my own.☆38Updated 2 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Updated 5 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- Splunk App to assist Sysmon Threat Hunting☆38Updated 8 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- ☆53Updated 7 years ago
- ☆76Updated 6 years ago
- A companion tool for BloodHound offering Active Directory statistics and number crunching☆64Updated 6 years ago
- Projects for AWS ThreatHunting☆21Updated 3 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Splunk app for Threat hunting☆15Updated 6 years ago
- Mitre Att&ck Technique Emulation☆82Updated 6 years ago
- Compilation of resources to help with Adversary Simulation automation harness☆100Updated 4 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- Repository for my ATT&CK analysis research.☆69Updated 6 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- A MITRE Caldera plugin written in Python 3 used to convert Red Canary Atomic Red Team Tests to MITRE Caldera Stockpile YAML ability files…☆71Updated 3 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- Notebooks created to attack and secure Active Directory environments☆27Updated 5 years ago
- Python parser for Red Canary's Atomic Red Team Yamls☆27Updated 6 years ago
- Generate ATT&CK Navigator layer file from PowerShell Empire agent logs☆49Updated 6 years ago
- Purple Team Security☆75Updated 3 years ago
- Powershell / C# based cross platform forensic framework based for live incident response☆23Updated 4 years ago
- Deploy and maintain Symon through the Splunk Deployment Sever☆31Updated 4 years ago
- ☆17Updated 8 years ago
- ☆30Updated 6 years ago
- Credit to Helge Klein - https://helgeklein.com/blog/2015/02/creating-realistic-test-user-accounts-active-directory/☆69Updated 7 years ago
- 504 VSAgent☆23Updated 7 years ago
- No-Script Automation Tool☆56Updated 6 years ago