0x4D31 / salt-scannerView external linksLinks
Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration
☆261Oct 18, 2017Updated 8 years ago
Alternatives and similar repositories for salt-scanner
Users that are interested in salt-scanner are comparing it to the libraries listed below
Sorting:
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆104Aug 9, 2017Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Aug 7, 2020Updated 5 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Next Generation Firewall Audit and Bypass Tool☆266Apr 24, 2017Updated 8 years ago
- Neet - Network Enumeration and Exploitation Tool☆167Nov 30, 2016Updated 9 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆534Aug 1, 2018Updated 7 years ago
- wide range mass audit toolkit☆1,034Oct 3, 2018Updated 7 years ago
- Detect and prevent KRACK attacks in your network☆183Oct 20, 2017Updated 8 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆739Mar 18, 2024Updated last year
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Remote Recon and Collection☆459Nov 23, 2017Updated 8 years ago
- Query and report user logons relations from MS Windows Security Events☆243Aug 9, 2018Updated 7 years ago
- The Most Comprehensive Docker Security Scanner☆1,511Updated this week
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆181Jul 26, 2017Updated 8 years ago
- Easy automated vulnerability scanning, reporting and analysis☆709Jan 10, 2020Updated 6 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Sep 14, 2024Updated last year
- BinProxy is a proxy for arbitrary TCP connections. You can define custom message formats using the BinData gem.☆177Dec 1, 2022Updated 3 years ago
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Jan 31, 2017Updated 9 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆314Sep 10, 2018Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Microsoft Office / COM Object DLL Planting☆15May 14, 2016Updated 9 years ago
- This script will create a POC that will steal NTML hashes from a remote computer. Do not use this for illegal purposes.The author does no…☆252Sep 27, 2023Updated 2 years ago
- Automated Linux evil maid attack☆435Dec 22, 2015Updated 10 years ago
- HonSSH is designed to log all SSH communications between a client and server.☆375Jan 2, 2022Updated 4 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Sep 14, 2020Updated 5 years ago
- WebApp Information Gatherer☆551May 29, 2018Updated 7 years ago
- Powershell Empire Persistence finder☆119Jan 30, 2017Updated 9 years ago
- DC25 5A1F - Demystifying Windows Kernel Exploitation by Abusing GDI Objects☆148Jul 30, 2017Updated 8 years ago