rapid7 / nexpose-resourcesLinks
Scripts, SQL queries, and other resources for Nexpose
☆27Updated 3 months ago
Alternatives and similar repositories for nexpose-resources
Users that are interested in nexpose-resources are comparing it to the libraries listed below
Sorting:
- InsightVM PostgreSQL Reports, Queries, ETC.☆26Updated 2 years ago
- Nexpose Community vulnerability checks☆32Updated 4 years ago
- the UNOFFICIAL (but useful) Python library for the Rapid7 InsightVM/Nexpose RESTful API☆78Updated 8 months ago
- The UNOFFICIAL (but useful) Ruby gem for the Rapid7 InsightVM/Nexpose RESTful API☆13Updated 8 months ago
- PowerShell Script for Windows Server Compliance / Security Configuration Audit☆62Updated 8 years ago
- ☆54Updated 3 years ago
- generic scripts for managing nexpose☆15Updated 6 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Find accounts using common and default passwords in Active Directory.☆68Updated 5 years ago
- PowerShell Module for automating Tenable Nessus Vulnerability Scanner.☆88Updated 2 years ago
- Snapshot, patch, health-check, and potentially roll-back Windows VMs☆34Updated 7 years ago
- Coding samples using the Kenna Security Platform REST API. All the code samples in this GitHub repository are offered “as is” and include…☆31Updated last month
- Scripts to help work with configuration audit files☆85Updated 2 years ago
- ☆34Updated 4 years ago
- A collaborative CISSP notes card☆40Updated 9 years ago
- Check_ioc is a script to check for various, selectable indicators of compromise on Windows systems via PowerShell and Event Logs. It was …☆77Updated 7 years ago
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆112Updated 10 months ago
- Builds a hashmap of AD NTLM hashes/usernames and iterates through a second list of hashes checking for the existence of each entry in the…☆77Updated 4 years ago
- ☆21Updated 2 years ago
- Incident Response Playbooks☆14Updated 5 years ago
- MineMeld nodes for MISP☆19Updated last year
- Discover "HotSpots" - potential spots for credentials theft☆23Updated 7 years ago
- Security Assessment Data Management and Analysis Tool☆39Updated 4 years ago
- Sharing Threat Hunting runbooks☆25Updated 5 years ago
- Create alerts in The Hive from your Graylog alerts, to be turned into Hive cases.☆44Updated 4 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 3 years ago
- Secure and log *available* activities in your Microsoft Office 365 environment☆39Updated 6 years ago
- Powershell Scripts to work on Crowdstrike Falcon that pull back raw data relevant to forensic investigation☆22Updated 5 months ago
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆53Updated 2 years ago
- Expert Investigation Guides☆51Updated 4 years ago