PowerShell Module for automating Tenable Nessus Vulnerability Scanner.
☆88Nov 30, 2022Updated 3 years ago
Alternatives and similar repositories for Posh-Nessus
Users that are interested in Posh-Nessus are comparing it to the libraries listed below
Sorting:
- PowerShell module to automate via XMLRPC a remote Metasploit server.☆15May 30, 2014Updated 11 years ago
- nessus plugin for metasploit to connect to a nessus server☆23May 1, 2013Updated 12 years ago
- Scripts to get the most out of Tenable.io☆12Feb 10, 2021Updated 5 years ago
- Maltego transform for visualizing Nessus scan data☆45Dec 11, 2019Updated 6 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- Why hunt when you can seine?☆21May 12, 2015Updated 10 years ago
- A module for working with McAfee EPO API☆14Dec 31, 2019Updated 6 years ago
- Yet another AV evasion tool☆117Jan 3, 2022Updated 4 years ago
- A collection of infrastructure related tests for use with Pester & PowerShell.☆15Jul 12, 2019Updated 6 years ago
- Exchange Powershell / Cli Email Client (like pine, but powershell based). And also to be used in automation scripts. Little by little sta…☆24Jan 30, 2018Updated 8 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Repository of yara rules☆60Nov 29, 2022Updated 3 years ago
- Send SYSLOG messages from PowerShell☆92Jul 24, 2024Updated last year
- PowerShell Module with Security cmdlets for security work☆448Feb 27, 2020Updated 6 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆45Dec 24, 2018Updated 7 years ago
- Currently not updated for WMIEvent module...☆262Feb 23, 2016Updated 10 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆41Jul 29, 2020Updated 5 years ago
- Executes PowerShell from an unmanaged process☆29Dec 15, 2014Updated 11 years ago
- (Unofficial) Python API for http://ransomwaretracker.abuse.ch/tracker/☆16Feb 28, 2017Updated 9 years ago
- Integration for Jira ticket creation from Tenable vulnerability scans☆17Mar 28, 2019Updated 6 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- The OVAL Language Sandbox☆44Jan 25, 2021Updated 5 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Apr 12, 2015Updated 10 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- PHP wrapper functions for interfacing with the Nessus V6.x API☆15Feb 14, 2017Updated 9 years ago
- ☆65May 26, 2016Updated 9 years ago
- ☆100Oct 29, 2018Updated 7 years ago
- VOYEUR's main purpose is to generate a fast (and pretty) Active Directory report. The tool is developed entirely in PowerShell (a powerfu…☆160Mar 8, 2017Updated 8 years ago
- PowerForensics provides an all in one platform for live disk forensic analysis☆1,428Nov 16, 2023Updated 2 years ago
- For use in our Tenable.IO to AWS Security Hub integration☆28Sep 4, 2025Updated 6 months ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- The golden AMI pipeline enables creation, distribution, verification, launch-compliance, and decommissioning of the golden AMI out of the…☆11Jan 8, 2020Updated 6 years ago
- ☆10May 30, 2015Updated 10 years ago
- ☆15Jun 28, 2024Updated last year
- A command line interface for batch data insertion / retrieval from a Tenable Network Security Nessus SecurityCenter instance, with accomp…☆11May 16, 2018Updated 7 years ago
- PowerShell module for working with Citrix NetScaler REST API☆14Dec 25, 2015Updated 10 years ago
- PowerShell module containing functions for creating reports on file, folder and share ACL's, storing the reports and comparing them with …☆24May 20, 2016Updated 9 years ago