m0nkeyplay / TenableIOLinks
Scripts to get the most out of Tenable.io
☆12Updated 4 years ago
Alternatives and similar repositories for TenableIO
Users that are interested in TenableIO are comparing it to the libraries listed below
Sorting:
- Incident Response Playbooks☆15Updated 6 years ago
- ☆14Updated 11 months ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated 10 months ago
- ☆55Updated 4 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆49Updated last year
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆84Updated last week
- Scripts to help work with configuration audit files☆90Updated 2 years ago
- Implementing the CIS Critical Controls (almost) for Free☆87Updated 3 years ago
- the UNOFFICIAL (but useful) Python library for the Rapid7 InsightVM/Nexpose RESTful API☆78Updated last year
- Security-Focused O365 Management and Log Scripts☆62Updated 3 years ago
- SIEM USE Case Selection Methodology☆17Updated 5 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Updated 8 years ago
- Security Assessment Data Management and Analysis Tool☆38Updated 4 years ago
- ☆49Updated 2 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Updated last year
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆45Updated 5 years ago
- A free incident response management and documentation workbook☆25Updated 7 years ago
- Workflows for Shuffle☆24Updated 3 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 5 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆130Updated 5 years ago
- Wrap any binary into a cached webserver☆56Updated 3 years ago
- Repository for SPEED SIEM Use Case Framework☆56Updated 5 years ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆89Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- Ingesting Shodan Monitor Alerts to Microsoft Sentinel☆34Updated 2 years ago
- Tools and scripts by Arctic Wolf☆70Updated 5 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Updated 3 years ago
- Azure AD Incident Response☆26Updated 4 years ago
- Incident Response Methodologies (IRM), also called Incident Playbook, based on the work done by the CERT Societe General☆24Updated 4 years ago