We're pleased to announce the beta 2 version of GoLismero 2.0.
In this new version you can find a lot of changes, like:
- Integration with Nmap.
- Added IP address geolocation support.
- Added 22 new vulnerability types to the data model.
- Now vulnerabilities may be categorized using the following standards:
+ Bugtraq ID
+ CERT Advisory
+ CAPEC
+ CVE
+ CWE
+ OSVDB
+ Secunia Advisory
+ Security Tracker ID
+ CERT Vulnerability Note
+ ISS X-Force ID
- Added NIST CPE database.
- Added reStructured Text output format.
- Improvements to the command line UI and text reports, including Bash autocompletion support.
- Many improvements and internal refactoring that won't show :)
- Bugfixes!
This list is sponsored by: Information Assurance Certification Review Board
Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
We're pleased to announce the beta 2 version of GoLismero 2.0.
In this new version you can find a lot of changes, like:
- Integration with Nmap.
- Added IP address geolocation support.
- Added 22 new vulnerability types to the data model.
- Now vulnerabilities may be categorized using the following standards:
+ Bugtraq ID
+ CERT Advisory
+ CAPEC
+ CVE
+ CWE
+ OSVDB
+ Secunia Advisory
+ Security Tracker ID
+ CERT Vulnerability Note
+ ISS X-Force ID
- Added NIST CPE database.
- Added reStructured Text output format.
- Improvements to the command line UI and text reports, including Bash autocompletion support.
- Many improvements and internal refactoring that won't show :)
- Bugfixes!
Cheers!
------------------------------------------------------------------------
This list is sponsored by: Information Assurance Certification Review Board
Prove to peers and potential employers without a doubt that you can actually do a proper penetration test. IACRB CPT and CEPT certs require a full practical examination in order to become certified.
http://www.iacertification.org
------------------------------------------------------------------------
[ reply ]