The Nessus Cheat Sheet is a comprehensive reference guide for the Nessus vulnerability scanner. It provides detailed information about Nessus system components including data directories, binary directories, log locations, and plugin directories. The cheat sheet covers advanced configuration settings and API usage for managing the scanner programmatically. The guide includes instructions for plugin management, such as searching plugin content and checking for the latest available plugin feeds. It also outlines best practices for configuring and operating Nessus effectively. Additional resources are provided including links to official Nessus documentation, download pages, plugin search functionality, and community forums for further learning and support.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
Free and open-source cybersecurity training classes with multi-class learning paths for high-skill, high-pay job skills.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
INE Security offers a range of cybersecurity certifications, including penetration testing, mobile and web application security, and incident response.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A curated collection of companies that have publicly disclosed adversary tactics, techniques, and procedures following security breaches.
A comprehensive guide to developing an incident response capability through intelligence-based threat hunting, covering theoretical concepts and real-life scenarios.
A comprehensive guide to incident response, providing effective techniques for responding to advanced attacks against local and remote network resources.
Comprehensive endpoint protection platform providing unified visibility and security for cloud workloads, endpoints, and containers.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.