scriptkittie / Nexpose-SQL-queries
Useful SQL queries for Nexpose
☆19Updated 7 years ago
Alternatives and similar repositories for Nexpose-SQL-queries:
Users that are interested in Nexpose-SQL-queries are comparing it to the libraries listed below
- ☆40Updated 4 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆24Updated 5 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆27Updated 6 years ago
- Scapy packet fragment reassembly engines☆33Updated 4 years ago
- ☆30Updated 6 years ago
- InsightVM PostgreSQL Reports, Queries, ETC.☆26Updated 2 years ago
- Build your own threat hunting maturity model☆11Updated 7 years ago
- Rapid Assessment of Web Resources☆18Updated 8 years ago
- Wrap any binary into a cached webserver☆53Updated 2 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Updated 6 years ago
- ☆34Updated 4 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Powershell - web traffic whitenoise generator☆47Updated 4 years ago
- Use DNS to hunt for threats including DGAs☆15Updated 9 years ago
- Lokix Platform is a free open-source solution to help blue teams and threat hunters use Loki Scanner to sweep enterprise networks☆25Updated 4 years ago
- ☆21Updated 3 years ago
- The Fastest way to consume Threat Intel☆25Updated 2 years ago
- Searches for Insider Threat Hunting☆31Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- A tool to assess data quality, built on top of the awesome OSSEM.☆77Updated 2 years ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Updated 5 years ago
- Expert Investigation Guides☆51Updated 4 years ago
- Defence Against the Dark Arts☆34Updated 5 years ago
- pollen - A command-line tool for interacting with TheHive☆35Updated 5 years ago
- automate your MISP installs☆67Updated 4 years ago
- A collection of typical false positive indicators☆55Updated 4 years ago
- ☆54Updated 3 years ago
- Recon Hunt Queries☆76Updated 3 years ago
- ☆41Updated 11 months ago
- A script to assist in processing forensic RAM captures for malware triage☆27Updated 4 years ago