CERT-Polska / ArtemisLinks
A modular vulnerability scanner with automatic report generation capabilities.
☆1,105Updated last week
Alternatives and similar repositories for Artemis
Users that are interested in Artemis are comparing it to the libraries listed below
Sorting:
- Pen Test Report Generation and Assessment Collaboration☆587Updated last month
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆896Updated 2 weeks ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,011Updated 10 months ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆751Updated 5 months ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆468Updated this week
- 💀 Don't fear the Reaper 👻☆815Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆682Updated 3 weeks ago
- Bitor Scanning Software☆451Updated 2 months ago
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆856Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆722Updated 5 months ago
- Nmap Dashboard Mini Project☆623Updated last year
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated 2 weeks ago
- Open Adversarial Exposure Validation Platform☆1,590Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆463Updated last year
- The OSTE meta scanner is a comprehensive web vulnerability scanner that combines multiple DAST scanners, including Nikto Scanner, ZAP, Nu…☆300Updated 4 months ago
- Vulnerability-Lookup facilitates quick correlation of vulnerabilities from various sources, independent of vulnerability IDs, and streaml…☆441Updated this week
- ☆219Updated last year
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆884Updated 3 weeks ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆493Updated last week
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,062Updated 2 weeks ago
- secator - the pentester's swiss knife☆1,230Updated this week
- SOCFortress CoPilot☆429Updated this week
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆442Updated 3 months ago
- Threat-hunting tool for Linux☆1,033Updated this week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,282Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆501Updated 3 weeks ago
- An automation tool that enumerates subdomains then filters out xss, sqli, open redirect, lfi, ssrf and rce parameters and then scans for …☆1,266Updated last year
- Advanced Wazuh Rules for more accurate threat detection. Feel free to implement within your own Wazuh environment, contribute, or fork!☆1,197Updated 2 weeks ago
- VULNRΞPO - Free vulnerability report generator and repository, end-to-end encrypted! Templates of issues, CWE,CVE,MITRE ATT&CK,PCI DSS, i…☆546Updated this week
- Captures network traffic app made in Rust.☆76Updated this week