d4t4king / lynis-report-converterLinks
Manageable report from lynis text output, in various formats.
☆77Updated 7 months ago
Alternatives and similar repositories for lynis-report-converter
Users that are interested in lynis-report-converter are comparing it to the libraries listed below
Sorting:
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆110Updated 7 years ago
- A docker container for openvas☆70Updated 4 years ago
- Docker files for Security Onion☆42Updated 4 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated 3 weeks ago
- Greenbone Vulnerability Management Containers☆88Updated 2 years ago
- ☆23Updated 6 years ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆92Updated 5 years ago
- Web Frontend for testssl.sh☆134Updated 8 years ago
- Greenbone Vulnerability Management for Docker - based on git source code.☆39Updated last year
- A library and a tool for converting audit logs to XML and JSON☆46Updated 7 years ago
- An Ansible playbook for deploying the Suricata intrusion detection system and fetching Snort rules with Oinkmaster.☆17Updated 4 years ago
- OwlH Master API☆24Updated 6 months ago
- setup and configure linux auditd☆21Updated this week
- Logstash configuration filter set framework to parse modsecurity audit logs☆112Updated 5 years ago
- A firewall management system.☆90Updated 6 months ago
- Elasticsearch for Offensive Security☆141Updated 5 years ago
- A low/zero interaction ssh authentication logging honeypot☆23Updated 3 weeks ago
- Logstash Configuration for Linux Logs (Authentication, Apache, Mail)☆93Updated 6 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Snort IDS/IPS log analytics using the Elastic Stack.☆87Updated 4 years ago
- Offensive Infrastructure with Modern Technologies☆91Updated 4 years ago
- Manages continuous scans of your infrastructure☆107Updated 3 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆112Updated 9 months ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆155Updated last year
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- Ansible CentOS 7 - CIS Benchmark Hardening Script☆89Updated 4 years ago
- harden system (linux, unix...)☆56Updated 2 weeks ago
- Auth.log parser☆47Updated 7 years ago
- Collection of Auditd Examples and Presentations☆87Updated 5 years ago
- ☆12Updated 5 years ago