d4t4king / lynis-report-converterLinks
Manageable report from lynis text output, in various formats.
☆74Updated 2 months ago
Alternatives and similar repositories for lynis-report-converter
Users that are interested in lynis-report-converter are comparing it to the libraries listed below
Sorting:
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆108Updated 6 years ago
- Greenbone Vulnerability Management for Docker - based on git source code.☆39Updated last year
- A docker container for openvas☆69Updated 4 years ago
- Greenbone Vulnerability Management Containers☆88Updated last year
- Ansible snippets and code for Lynis☆43Updated 6 years ago
- Tool to check compliance with CIS Linux Benchmarks, specifically Distribution Independent, Debian 9 and Ubuntu 18.04 LTS, and generate sp…☆24Updated 4 years ago
- Docker files for Security Onion☆41Updated 4 years ago
- Non Official - Greenbone Vulnerability Management version 10 Docker image☆29Updated 5 years ago
- Logs Forensic Investigator SSH☆15Updated 6 years ago
- A firewall management system.☆89Updated 2 months ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆41Updated 2 years ago
- Elasticsearch for Offensive Security☆142Updated 4 years ago
- Vulnerability Data in ES☆146Updated 7 years ago
- ☆23Updated 5 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 2 weeks ago
- ☆59Updated 3 years ago
- OwlH Master API☆24Updated 2 months ago
- DevSec Linux Patch Baseline - InSpec Profile☆83Updated 10 months ago
- A modern arpwatch replacement with JSON formatted outputs and easy options to exec commands when network changes are observed.☆32Updated last year
- Manages continuous scans of your infrastructure☆107Updated 3 years ago
- Selective DNS proxy forwarding based on DNS threat blocking providers intelligence.☆57Updated 7 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆109Updated 5 months ago
- DevSec MySQL Baseline - InSpec Profile☆62Updated 10 months ago
- Auth.log parser☆47Updated 7 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆154Updated last year
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆72Updated 6 years ago
- ☆52Updated 5 years ago