m0nkeyplay / TenableIOLinks
Scripts to get the most out of Tenable.io
☆12Updated 5 years ago
Alternatives and similar repositories for TenableIO
Users that are interested in TenableIO are comparing it to the libraries listed below
Sorting:
- Incident Response Playbooks☆15Updated 6 years ago
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Updated 2 weeks ago
- Sysmon configuration file template with default high-quality event tracing☆20Updated 5 years ago
- Scripts to help work with configuration audit files☆90Updated 2 years ago
- SIEM USE Case Selection Methodology☆17Updated 5 years ago
- Implementing the CIS Critical Controls (almost) for Free☆87Updated 3 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆51Updated last year
- Security-Focused O365 Management and Log Scripts☆62Updated 3 years ago
- ☆78Updated 3 weeks ago
- Security Assessment Data Management and Analysis Tool☆38Updated 4 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆24Updated last year
- ☆14Updated last year
- ☆73Updated 2 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Updated 8 years ago
- The Infosec Community Definitive Guide to Jupyter Notebooks☆131Updated 5 years ago
- ☆56Updated 4 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Updated 3 years ago
- Tool to extract Sessions, MessageID(s) and find the emails belonging to MessageID(s). This script utilizes the MailItemsAccessed features…☆41Updated 5 years ago
- Wrap any binary into a cached webserver☆57Updated 3 years ago
- Distribution of the SANS SEC504 Windows Cheat Sheet Lab☆77Updated 5 years ago
- Sharing Threat Hunting runbooks☆25Updated 6 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 7 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆55Updated 3 years ago
- Designed to be installed on a fresh install of raspbian on a raspberry pi, by combining Respounder (Responder detection) and Artillery (p…☆34Updated 6 years ago
- ☆43Updated 2 years ago
- Collection of resources related to the Center for Threat-Informed Defense☆76Updated last year
- ☆49Updated 2 years ago
- Azure AD Incident Response☆27Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆76Updated 5 years ago