tenable / audit_scriptsLinks
Scripts to help work with configuration audit files
☆87Updated 2 years ago
Alternatives and similar repositories for audit_scripts
Users that are interested in audit_scripts are comparing it to the libraries listed below
Sorting:
- ☆55Updated 4 years ago
- Collection of walkthroughs on various threat hunting techniques☆75Updated 5 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆149Updated 3 years ago
- The Phishing Intelligence Engine - An Active Defense PowerShell Framework for Phishing Defense with Office 365☆179Updated 5 years ago
- Purple Team Security☆75Updated 3 years ago
- Miscelaneous Dockers☆47Updated 4 years ago
- Send your nessus compliance and vulnerability scan data to ElasticSearch☆28Updated 6 years ago
- Powershell - web traffic whitenoise generator☆47Updated 5 years ago
- automate your MISP installs☆68Updated 5 years ago
- A Splunk App containing Sigma detection rules, which can be updated from a Git repository.☆110Updated 5 years ago
- Expert Investigation Guides☆52Updated 4 years ago
- Cloud Security Operations Orchestrator☆187Updated last year
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Tools to automate and/or expedite response.☆115Updated last year
- Qualys community open source scripts. Please note these are provided as-is and are not supported.☆111Updated last year
- Provides detection capabilities and log conversion to evtx or syslog capabilities☆54Updated 3 years ago
- SOC Workflow App helps Security Analysts and Threat Hunters explore suspicious events, look into raw events arriving at the Elastic Stack…☆94Updated 2 years ago
- Collecting & Hunting for IOCs with gusto and style☆241Updated 4 years ago
- ☆34Updated 4 years ago
- The project was moved here https://github.com/atomic-threat-coverage/atomic-threat-coverage☆25Updated 6 years ago
- ☆77Updated 6 years ago
- Security Monitoring Resolution Categories☆138Updated 3 years ago
- Download a list of suspected malicious IPs and Domains. Create a QRadar Reference Set. Search Your Environment For Malicious IPs☆69Updated 4 years ago
- A Splunk app with saved reports derived from Sigma rules☆73Updated 7 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- ☆77Updated 5 years ago
- This was code for analyzing round 1 of the MITRE Enterprise ATT&CK Evaluation. Please check out https://github.com/joshzelonis/Enterprise…☆95Updated 5 years ago
- Resolvn Threat Hunting Virtual Machine☆139Updated 6 years ago
- Attack Range to test detection against nativel serverless cloud services and environments☆35Updated 3 years ago
- misp-cloud - Cloud-ready images of MISP☆73Updated 3 years ago