BrianWGray / nexpose
generic scripts for managing nexpose
☆15Updated 6 years ago
Alternatives and similar repositories for nexpose
Users that are interested in nexpose are comparing it to the libraries listed below
Sorting:
- Nexpose Community vulnerability checks☆32Updated 4 years ago
- Scripts, SQL queries, and other resources for Nexpose☆27Updated 2 months ago
- The UNOFFICIAL (but useful) Ruby gem for the Rapid7 InsightVM/Nexpose RESTful API☆12Updated 8 months ago
- InsightVM PostgreSQL Reports, Queries, ETC.☆26Updated 2 years ago
- ☆73Updated 7 years ago
- Simple block lists hub for PAN-OS DBL feature☆35Updated 6 years ago
- Learn you a book for some infosec good☆63Updated 5 years ago
- WebUI of MineMeld☆43Updated 2 years ago
- Basic Anomaly IDS capabilities with Python and Bro☆105Updated 7 years ago
- Automatic firewall rule orchestator.☆83Updated 7 years ago
- Repo for autosnort scripts.☆158Updated 4 years ago
- Application which generates the structure and related files necessary for developing a Data Exchange Layer (DXL) integration with Python☆12Updated 5 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆180Updated 5 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Cyber Analytics Platform and Examination System (CAPES) Project Page☆60Updated 5 years ago
- ☆141Updated 11 months ago
- Evolving directions on building the best Open Source Forensics VM☆160Updated 6 years ago
- Use OpenDNS's investigate API to find newly observed domains which match a brand or string☆17Updated 8 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Vulnerability Compliance Report Tool used to parse Nessus files into html reports created by SynerComm, Inc.☆165Updated 6 years ago
- Schillings SwordPhish empowers organisations and engages its employees to establish the key component of any cyber security strategy: th…☆109Updated 7 years ago
- The Intelligent Honey Net Project attempts to create actionable information from honeypots☆62Updated 9 years ago
- ☆15Updated 5 years ago
- A tool designed for consistent and safe capture of off network web resources.☆38Updated 8 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- Scripts for comparing Microsoft Windows compliance with the ASD 1709 & Office 2016 Hardening Guides☆159Updated 5 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆67Updated 6 years ago
- Qualys API connector.☆104Updated 8 months ago
- NebulousAD automated credential auditing tool.☆155Updated 5 years ago
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago