tenable / audit_filesLinks
Nessus Audit files
☆32Updated 2 years ago
Alternatives and similar repositories for audit_files
Users that are interested in audit_files are comparing it to the libraries listed below
Sorting:
- Malicious actors often reuse code to deploy their malware, phishing website or CNC server. As a result, similiaries can be found on URLs …☆75Updated 2 years ago
- nse script to inject jndi payloads☆45Updated 4 years ago
- Virtual Security Operations Center☆52Updated 2 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆127Updated 9 months ago
- ☆45Updated 3 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- ☆70Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆60Updated 3 years ago
- ☆44Updated 5 months ago
- Enumerate Microsoft 365 Groups in a tenant with their metadata☆55Updated 4 years ago
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆62Updated this week
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 8 months ago
- Manticore Adversary Emulation Cli☆47Updated 5 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆35Updated 5 years ago
- A simple command line program to help defender test their detections for network beacon patterns and domain fronting☆70Updated 3 years ago
- Building ActiveDirectory Lab for practicing various attack vectors used during Red Team engagement.☆38Updated 5 years ago
- attack2jira automates the process of standing up a Jira environment that can be used to track and measure ATT&CK coverage☆115Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆18Updated 4 years ago
- Indicator of Compromise Scanner for CVE-2019-19781☆94Updated 5 years ago
- Cont3xt intends to centralize and simplify a structured approach to gathering contextual intelligence in support of technical investigati…☆38Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- ☆80Updated 2 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆67Updated last year
- ☆28Updated 4 years ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 3 years ago
- Generic Signature Format for SIEM Systems☆14Updated 4 years ago
- Detect webshells dropped on Microsoft Exchange servers exploited through "proxylogon" group of vulnerabilites (CVE-2021-26855, CVE-2021-2…☆98Updated 4 years ago
- go-atomicredteam is a Golang application to execute tests as defined in the atomics folder of Red Canary's Atomic Red Team project (https…☆49Updated 2 years ago
- Threat Mapping Catalogue☆18Updated 4 years ago
- Triaging Windows event logs based on SANS Poster☆42Updated last month