attwad / nessieLinks
Tenable Nessus 6 API client in Go
☆16Updated 4 years ago
Alternatives and similar repositories for nessie
Users that are interested in nessie are comparing it to the libraries listed below
Sorting:
- Yara powered NIDS with high speed packet capture powered by PF_RING☆69Updated last year
- Recog-Go: Pattern Recognition using Rapid7 Recog☆118Updated 2 years ago
- Useful resources for Zeek(https://zeek.org/) (Bro(http://bro.org/))☆31Updated 5 years ago
- Nmap XML parsing library for Go☆105Updated 2 years ago
- How to Zeek Sysmon Logs!☆102Updated 3 years ago
- APIs for generating STIX 2.1 and TAXII 2.1 messages with Go (Golang)☆55Updated 10 months ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Open source tools, libraries, and datasets related to the runZero product and associated research☆121Updated 2 months ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Updated 8 years ago
- ☆44Updated 2 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- ☆186Updated last week
- General Open Architecture Security Questionnaire☆32Updated 2 years ago
- Chef Cookbook which provisions apache+mod_security+owasp-crs☆37Updated 7 years ago
- 威胁检测规则集☆15Updated 6 years ago
- Passive DNS collection using Zeek☆182Updated 2 years ago
- Black Hat EU 2018 - Don't Eat Spaghetti with a Spoon - An Analysis of the Practical Value of Threat Intelligence☆22Updated 6 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- ☆166Updated 2 years ago
- A Go implementation of JARM☆119Updated 3 years ago
- Bluehat 2018 Graphs for Security Workshop☆42Updated 7 years ago
- Ripple20 Critical Vulnerabilities - Detection Logic and Signatures☆12Updated 4 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆183Updated 2 weeks ago
- INTERCEPT / Policy as Code Auditing & Compliance☆85Updated 3 weeks ago
- A PoC tool designed to enhance the effectiveness of your traps by spreading breadcrumbs & honeytokens across your systems to lure the att…☆274Updated 6 years ago
- ☆57Updated last year
- Tools for conducting analysis of CVE data in Elasticsearch☆73Updated 3 months ago
- Build a local copy of CPE(Common Platform Enumeration)☆105Updated this week
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Bro integration with osquery☆15Updated 2 years ago