darvid / nessusbeatLinks
A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.
☆31Updated 8 years ago
Alternatives and similar repositories for nessusbeat
Users that are interested in nessusbeat are comparing it to the libraries listed below
Sorting:
- Nessus Vulnerability visualization for the web☆31Updated 9 years ago
- brostash: Linux distribution based on Debian and focusing on network security events collection☆34Updated 5 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Updated 6 years ago
- How to Zeek Sysmon Logs!☆103Updated 3 years ago
- Combining OSINT sources in Elastic Stack☆80Updated 5 years ago
- Vulnerability Data in ES☆143Updated 8 years ago
- Templates for Kibana/Logstash to use with Suricata IDPS☆81Updated 9 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆245Updated 2 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- Yet Another MOnitoring Tool☆60Updated 7 years ago
- ☆35Updated last year
- collector/runner☆65Updated 2 months ago
- Bro integration with osquery☆15Updated 2 years ago
- A lightweight tool to score network traffic and flag anomalies☆123Updated last year
- Detect kerberos attacks in pcap files☆29Updated 9 years ago
- Security Onion Elastic Stack☆46Updated 4 years ago
- NMap XML decoding for logstash☆28Updated 3 years ago
- Linux Exploit Mapper correlates CVEs local to a Linux system with known exploits☆45Updated 3 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 8 years ago
- ArmourBird CSF - Container Security Framework☆44Updated 3 years ago
- Simple REST-style web service for the CVE searching☆97Updated 2 years ago
- Passive DNS collection using Zeek☆181Updated 2 years ago
- Collaborative Distributed Scanning Application (Uses modified DNmap on backend)☆71Updated 9 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- ☆21Updated 5 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Updated 7 years ago
- Real Time Threat Monitoring Tool☆113Updated 3 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago