BrianWGray / cmty-nexpose-checksLinks
Nexpose Community vulnerability checks
☆32Updated 5 years ago
Alternatives and similar repositories for cmty-nexpose-checks
Users that are interested in cmty-nexpose-checks are comparing it to the libraries listed below
Sorting:
- generic scripts for managing nexpose☆15Updated 6 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆80Updated 8 years ago
- A powershell script for creating a Windows honeyport.☆90Updated 9 months ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆168Updated 6 years ago
- Parse URLCrazy and dnstwist output and compare against previous runs to identify new typosquatted domains.☆52Updated 10 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆64Updated 10 years ago
- GoatRider is a simple tool that will dynamically pull down Artillery Threat Intelligence Feeds, TOR, AlienVaults OTX, and the Alexa top 1…☆144Updated 7 years ago
- Nessus Vulnerability visualization for the web☆31Updated 9 years ago
- The Shared Host Integrated Password System (SHIPS) is a solution to provide unique and rotated local super user or administrator password…☆128Updated 7 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Miscelaneous useful scripts for my day to day projects☆123Updated 5 years ago
- Serverless, low cost, threat intel aggregation for enterprise or personal use, backed by ElasticSearch.☆141Updated 2 years ago
- Repo for autosnort scripts.☆156Updated 5 years ago
- Queries to parse sysmon event log file with microsoft logparser☆58Updated 10 years ago
- Nmap Script to scan for Winnti infections☆71Updated 7 years ago
- QRadio ~ Best Threat Intelligence Radio ~ Tune In!☆98Updated 9 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆105Updated 7 years ago
- ☆73Updated 8 years ago
- Simple REST-style web service for the CVE searching☆97Updated 2 years ago
- Foxhound: Blackbox - A Raspberry Pi NSM☆37Updated 7 years ago
- Tools for the Computer Incident Response Team☆149Updated 8 years ago
- A toolkit for Security Researchers☆127Updated 6 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Active Directory permissions (ACL/ACE) auditing tools☆148Updated 8 years ago
- Python abstract API for PassiveTotal services in the form of libraries and command line utilities.☆86Updated 2 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆181Updated 5 years ago
- ☆142Updated last year
- ☆138Updated 6 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- The Seeker of IOC☆131Updated 5 years ago