All Projects → tenable → Tenable.io-SDK-for-Python

tenable / Tenable.io-SDK-for-Python

Licence: MIT license
Tenable.io SDK offers a scalable and safe way to integrate with the Tenable.io platform.

Programming Languages

python
139335 projects - #7 most used programming language

Projects that are alternatives of or similar to Tenable.io-SDK-for-Python

vmware guest auth bypass
Proof of concept of VMSA-2017-0012
Stars: ✭ 42 (-49.4%)
Mutual labels:  vulnerability
vulnscan
A static binary vulnerability scanner
Stars: ✭ 47 (-43.37%)
Mutual labels:  vulnerability
SmmExploit
The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.
Stars: ✭ 98 (+18.07%)
Mutual labels:  vulnerability
SAP vulnerabilities
DoS PoC's for SAP products
Stars: ✭ 47 (-43.37%)
Mutual labels:  vulnerability
apachrot
Apache (Linux) CVE-2021-41773/2021-42013 Mass Vulnerability Checker
Stars: ✭ 21 (-74.7%)
Mutual labels:  vulnerability
PTEye
Phantom eye——A passive business logic vulnerability auditing tool
Stars: ✭ 55 (-33.73%)
Mutual labels:  vulnerability
trivy-vulnerability-explorer
Web application that allows to load a Trivy report in json format and displays the vulnerabilities of a single target in an interactive data table.
Stars: ✭ 63 (-24.1%)
Mutual labels:  vulnerability
PayloadsAll
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 31 (-62.65%)
Mutual labels:  vulnerability
safelog4j
Safelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
Stars: ✭ 38 (-54.22%)
Mutual labels:  vulnerability
nmap-log4shell
Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)
Stars: ✭ 54 (-34.94%)
Mutual labels:  vulnerability
break-fast-serial
A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs
Stars: ✭ 53 (-36.14%)
Mutual labels:  vulnerability
overflow
A command-line tool for exploiting stack-based buffer overflow vulnerabilities.
Stars: ✭ 66 (-20.48%)
Mutual labels:  vulnerability
rest-api
REST API backend for Reconmap
Stars: ✭ 48 (-42.17%)
Mutual labels:  vulnerability
weblogic honeypot
WebLogic Honeypot is a low interaction honeypot to detect CVE-2017-10271 in the Oracle WebLogic Server component of Oracle Fusion Middleware. This is a Remote Code Execution vulnerability.
Stars: ✭ 30 (-63.86%)
Mutual labels:  vulnerability
exynos-usbdl
Unsigned code loader for Exynos BootROM
Stars: ✭ 57 (-31.33%)
Mutual labels:  vulnerability
NIST-to-Tech
An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)
Stars: ✭ 61 (-26.51%)
Mutual labels:  vulnerability
TraditionalMitigation
Traditional Mitigation in GCC to defend Memory Corruption Vulnerability
Stars: ✭ 16 (-80.72%)
Mutual labels:  vulnerability
turing-machine
A Python program implementing and exploiting the Minsky Turing machine considered in the paper "Intrinsic Propensity for Vulnerability in Computers? Arbitrary Code Execution in the Universal Turing Machine" as per CVE-2021-32471 (https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-32471)
Stars: ✭ 70 (-15.66%)
Mutual labels:  vulnerability
CVE-2020-11651
CVE-2020-11651: Proof of Concept
Stars: ✭ 41 (-50.6%)
Mutual labels:  vulnerability
exploits
Some of my public exploits
Stars: ✭ 50 (-39.76%)
Mutual labels:  vulnerability

NOTICE: Tenable.io SDK for Python is being deprecated in favor of pyTenable

Tenable is deprecating the tenable_io package in favor of the more widely used library, pyTenable. pyTenable offers all of the same functionality as this package, as well as support for Tenable.sc. However, it should be noted that pyTenable functions are not compatible with tenable_io functions. Support for the tenable_io package will end on August 1, 2020.

Original README

Tenable.io SDK for Python

https://img.shields.io/pypi/v/tenable-io.svg?style=flat-square https://img.shields.io/github/license/tenable/Tenable.io-SDK-for-Python

Welcome to the Tenable.io SDK for Python. This library can be used to easily integrate with the tenable.io API.

For you coffee lovers, check out Tenable.io SDK for Java.

Report any issues here.

Additional documentation is available in our Developer Portal.

Installation

$ pip install tenable_io

Quick Start

Quickest way to get started is to checkout the example scripts.

Configuration

Access key and secret key are needed to authenticate with the Tenable Cloud API. There are three ways to supply the keys to the TenableIOClient:

Precedence Method
1 Constructor Arguments
2 INI File
3 Environment Variables

TenableIOClient Constructor Arguments

TenableIOClient(access_key='YOUR_ACCESS_KEY', secret_key='YOUR_SECRET_KEY')

INI File

A tenable_io.ini can be created in the working directory. See tenable_io.ini.example on what it should look like.
Note: The tenable_io.ini.example file is in Jinja template format.

Environment Variables

TenableIOClient looks for the environment variables TENABLEIO_ACCESS_KEY and TENABLEIO_SECRET_KEY.

Python Version

2.7, 3.4+

Development

It is recommend to use virtualenv to setup an isolated local environment.

$ virtualenv .venv
# To use a different python bin (i.e. python3).
$ virtualenv .venv3 -p $(which python3)
# To active the virtualenv
$ source ./.venv/bin/activate

Install dependencies.

$ pip install -r ./requirements.txt
$ pip install -r ./requirements-build.txt

Run Tests

Additional configuration is needed for tests to correctly run. See the [tenable_io-test] section under tenable_io.ini.example. Such configuration can be done via the INI file tenable_io.ini or environment variables.

$ py.test

Documentations

To generate/force update the RST documentations from docstrings.

$ sphinx-apidoc -f -o doc/source tenable_io

Generate HTML documentation.

$ cd doc
$ make clean && make html
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].