Skip to content

Instantly share code, notes, and snippets.

### Keybase proof
I hereby claim:
* I am marksee on github.
* I am mcollao (https://keybase.io/mcollao) on keybase.
* I have a public key whose fingerprint is 5079 F251 813C 4E6A C697 6708 F20A 3A18 4401 0E25
To claim this, I am signing this object:
var listHostsByVulnerabilityTitleRegex = function (vulnerabilityRegex) {
// Retrieves all host, port, protocol instances afflicted by a certain vulnerability
//
// Created by: Isaiah Sarju
// Based on listHostsByVulnerabilityTitle Dan Kottmann & updated by Alex Lauerman
// Usage: listHostsByVulnerabilityTitleRegex(/^SSL.*/);
// Requires client-side updates: false
var REGEX = vulnerabilityRegex;
var PROJECT_ID = Session.get('projectId');
@marksee
marksee / README.md
Created July 19, 2018 18:09 — forked from leonjza/README.md
goness - A golang Nessus XML parser for use in your shell pipeline

goness

A golang Nessus XML parser for use in your shell pipeline

examples

Just searching for "MS15":

$ goness -f exported_download.nessus | grep "MS15"
MS15-034: Vulnerability in HTTP.sys Could Allow Remote Code Execution (3042553) (uncredentialed check)|www|10.1.1.1:80