d4t4king / lynis-report-converter
Manageable report from lynis text output, in various formats.
☆72Updated last month
Alternatives and similar repositories for lynis-report-converter
Users that are interested in lynis-report-converter are comparing it to the libraries listed below
Sorting:
- ☆23Updated 5 years ago
- Make TLS/SSL security mass scans with testssl.sh and import results into ElasticSearch☆108Updated 6 years ago
- Non Official - Greenbone Vulnerability Management version 10 Docker image☆29Updated 5 years ago
- Greenbone Vulnerability Management for Docker - based on git source code.☆39Updated last year
- ansible role to setup MISP, Malware Information Sharing Platform & Threat Sharing☆53Updated last week
- Docker files for Security Onion☆41Updated 4 years ago
- ioc2rpz is a place where threat intelligence meets DNS.☆109Updated 3 months ago
- Logstash Configuration for Linux Logs (Authentication, Apache, Mail)☆92Updated 5 years ago
- Elasticsearch for Offensive Security☆141Updated 4 years ago
- harden system (linux, unix...)☆55Updated 2 weeks ago
- Kibana 7 Templates for Suricata IDPS Threat Hunting☆40Updated 2 years ago
- ☆59Updated 3 years ago
- OpenVAS 8 Docker Master Slave Containers☆26Updated 9 years ago
- OPNids GUI, API and systems backend☆34Updated 6 years ago
- Puppet providers and facts for OPNsense.☆11Updated 3 years ago
- Kibana 6 Templates for Suricata IDPS Threat Hunting☆24Updated 6 years ago
- Ansible snippets and code for Lynis☆43Updated 6 years ago
- Stealth is a File Integrity scanner performing its work in a stealthy way.☆12Updated 6 years ago
- Nix Audit made easier (RHEL, CentOS)☆64Updated 3 weeks ago
- Greenbone Vulnerability Management Containers☆88Updated last year
- A docker container for openvas☆68Updated 4 years ago
- OwlH Master API☆24Updated 2 weeks ago
- A low/zero interaction ssh authentication logging honeypot☆21Updated 9 months ago
- A simple Python script that calls SSL Labs API to do SSL testings on servers and create a report in html.☆29Updated 2 weeks ago
- Install and configure user mode auditd tools☆34Updated 2 years ago
- ☆23Updated 4 years ago
- Graylog Processing Pipeline functions to enrich log messages with IoC information from threat intelligence databases☆153Updated last year
- Bro script package to create JSON formatted logs to stream into data analysis systems.☆28Updated last year
- Example configuration files for Logstash☆44Updated 5 years ago
- Install open-source software from source to focus on Zero Trust Network principles, enhancing security for existing applications, and dep…☆67Updated 4 months ago