m0nkeyplay / TenableIO
Scripts to get the most out of Tenable.io
☆12Updated 4 years ago
Alternatives and similar repositories for TenableIO
Users that are interested in TenableIO are comparing it to the libraries listed below
Sorting:
- ☆54Updated 3 years ago
- SIEM USE Case Selection Methodology☆16Updated 4 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- A collection of dashboards, templates, API's and Power BI code for vulnerability management and analysis☆18Updated 3 months ago
- Wrap any binary into a cached webserver☆53Updated 3 years ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- A Command-line tool which leverages the Tenable Vulnerability Management API to reduce the time it takes to get information that is commo…☆76Updated this week
- Tool used to perform threat intelligence against packet data☆35Updated 3 months ago
- A free incident response management and documentation workbook☆24Updated 6 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Updated 7 years ago
- Ansible playbook for installing MineMeld on Linux☆48Updated 4 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- Table Top Exercise (TTX) for Computer Security Incident Response (CSIRT) teams. The templatized artifacts provided will hopefully help te…☆37Updated 4 years ago
- the UNOFFICIAL (but useful) Python library for the Rapid7 InsightVM/Nexpose RESTful API☆78Updated 8 months ago
- Repository for SPEED SIEM Use Case Framework☆53Updated 5 years ago
- RRR (Rapid Response Reporting) is a collection of Incident Response Report objects. They are designed to help incident responders provid…☆37Updated 3 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 4 years ago
- Scripts to help work with configuration audit files☆85Updated 2 years ago
- Security-Focused O365 Management and Log Scripts☆60Updated 2 years ago
- Digital Forensic Analysis and Incident Response Playbooks to handle real world security incidents☆41Updated last year
- A collection of scripts useful in management of Splunk deployment☆20Updated 8 months ago
- ☆34Updated 4 years ago
- Convert Sigma rules to LogRhythm searches☆21Updated 3 years ago
- scripts to configure the Splunk Universal Forwarder in a locked down state☆40Updated 6 years ago
- Defensive Origins Training Schedule☆38Updated last year
- ☆13Updated 4 months ago
- Run Velociraptor on Security Onion☆37Updated 2 years ago
- Workflows for Shuffle☆22Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Use Terraform to Provision Your Own Cloud-Based Remote Browsing Workstation☆25Updated last year