d4t4king / lynis-report-converterLinks
Manageable report from lynis text output, in various formats.
☆76Updated 5 months ago
Alternatives and similar repositories for lynis-report-converter
Users that are interested in lynis-report-converter are comparing it to the libraries listed below
Sorting:
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆109Updated 6 years ago
- A firewall management system.☆90Updated 5 months ago
- This is the public security policy of CISOfy, with extra resources like security tools.☆93Updated 5 years ago
- A docker container for openvas☆70Updated 4 years ago
- Greenbone Vulnerability Management Containers☆88Updated 2 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- A low/zero interaction ssh authentication logging honeypot☆23Updated last year
- from http://www.pc-tools.net/unix/grepcidr/☆90Updated 8 years ago
- Greenbone Vulnerability Management for Docker - based on git source code.☆39Updated last year
- ioc2rpz is a place where threat intelligence meets DNS.☆111Updated 7 months ago
- Logstash configuration filter set framework to parse modsecurity audit logs☆112Updated 5 years ago
- harden system (linux, unix...)☆56Updated last week
- ☆23Updated 6 years ago
- Docker files for Security Onion☆42Updated 4 years ago
- Offensive Infrastructure with Modern Technologies☆91Updated 4 years ago
- Web Frontend for testssl.sh☆133Updated 8 years ago
- CentOS Bench for Security is a script that implements checks which follows the CIS CentOS Linux 7 Benchmark.☆41Updated 7 years ago
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆54Updated this week
- Example configuration files for Logstash☆44Updated 5 years ago
- A library and a tool for converting audit logs to XML and JSON☆45Updated 7 years ago
- OpenVAS 8 Docker Master Slave Containers☆26Updated 9 years ago
- Ansible CentOS 7 - CIS Benchmark Hardening Script☆89Updated 4 years ago
- Elasticsearch for Offensive Security☆141Updated 5 years ago
- Passwords of SSH Intruders Transferred to Text☆157Updated last year
- Auth.log parser☆47Updated 7 years ago
- setup and configure linux auditd☆21Updated this week
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 7 years ago
- DevSec SSH Baseline - InSpec Profile☆287Updated last year
- How to write OSSEC alerts into Graylog☆12Updated 9 years ago
- Ansible Playbooks for Security Automation with Ansible2 book☆102Updated 7 years ago