KennaSecurity / All_Samples
Coding samples using the Kenna Security Platform REST API. All the code samples in this GitHub repository are offered “as is” and include no warranty of any kind. Use them at your own risk. In no event will Kenna be liable to end user or any other party for damages of any kind arising from the use of these samples.
☆31Updated 3 months ago
Alternatives and similar repositories for All_Samples:
Users that are interested in All_Samples are comparing it to the libraries listed below
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆111Updated 8 months ago
- A collaborative CISSP notes card☆40Updated 9 years ago
- Scripts, SQL queries, and other resources for Nexpose☆27Updated last month
- Security Scanner based on CIS benchmark 1.1 inspired by Scout2☆53Updated 2 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 6 years ago
- These are files that a new CISO or someone introducing security to an organization can leverage to bridge the gap between security and th…☆71Updated 6 months ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- Scripts to help work with configuration audit files☆85Updated 2 years ago
- DefectDojo Documentation☆17Updated 3 years ago
- Cloud security tutorials and best practices☆38Updated 2 years ago
- Implementing the CIS Critical Controls (almost) for Free☆86Updated 2 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Falcon Data Replicator☆31Updated last week
- PowerShell Script for Windows Server Compliance / Security Configuration Audit☆61Updated 8 years ago
- Kenna Security API and Scripting Toolkit☆35Updated this week
- GitHub action to run Threagile, the agile threat modeling toolkit, on a repo's threagile.yaml file☆13Updated 11 months ago
- Tools for AWS forensics☆63Updated 9 years ago
- Threathunt details for the Solarwinds compromise☆33Updated 3 years ago
- Cloud deployment size calculation utilities☆18Updated 3 weeks ago
- ☆33Updated 2 years ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆53Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Automatically exported from code.google.com/p/nipper-ng☆71Updated 2 years ago
- ☆141Updated 10 months ago
- Controls Assessment Specification☆69Updated 2 weeks ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- ☆70Updated 8 months ago
- Materials used and mentioned during my talk at SANS Cloud Security Summit 2018 in San Diego☆23Updated 7 years ago