CERT-Polska / ArtemisView external linksLinks
A modular vulnerability scanner with automatic report generation capabilities.
☆1,116Updated this week
Alternatives and similar repositories for Artemis
Users that are interested in Artemis are comparing it to the libraries listed below
Sorting:
- Distributed malware processing framework based on Python, Redis and S3.☆462Dec 1, 2025Updated 2 months ago
- DRAKVUF Sandbox - automated hypervisor-level malware analysis system☆1,263Updated this week
- Threat-hunting tool for Linux☆1,035Feb 3, 2026Updated last week
- CocktailParty is a data broker system based on phoenix framework☆23Apr 23, 2025Updated 9 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,149Updated this week
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,353Updated this week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆195Feb 2, 2026Updated last week
- Collaborative Incident Response platform☆1,384Jan 27, 2026Updated 2 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,451Updated this week
- An offensive data enrichment pipeline☆914Updated this week
- Burp Suite's extension to scan and crawl Single Page Applications☆107Apr 14, 2023Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45May 25, 2023Updated 2 years ago
- ☆567Mar 28, 2024Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Dec 26, 2023Updated 2 years ago
- Pen Test Report Generation and Assessment Collaboration☆590Updated this week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆870Dec 31, 2025Updated last month
- Malduck is your ducky companion in malware analysis journeys☆349Jun 22, 2025Updated 7 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆520Updated this week
- AIL framework - Analysis Information Leak framework☆878Feb 4, 2026Updated last week
- SploitScan is a sophisticated cybersecurity utility designed to provide detailed information on vulnerabilities and associated exploits.☆1,289Feb 5, 2026Updated last week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆898Updated this week
- AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover se…☆1,471Jan 23, 2026Updated 3 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Nov 5, 2025Updated 3 months ago
- Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.☆2,360Jan 23, 2026Updated 3 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Dec 13, 2025Updated 2 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,019Mar 21, 2025Updated 10 months ago
- Galah: An LLM-powered web honeypot.☆635Jul 24, 2025Updated 6 months ago
- Discover hidden debugging parameters and uncover web application secrets☆248Feb 4, 2026Updated last week
- Redeye is a tool intended to help you manage your data during a pentest operation☆473Aug 21, 2024Updated last year
- Zero shot vulnerability discovery using LLMs☆2,497Feb 6, 2025Updated last year
- Hunt every Endpoint in your code, expose Shadow APIs, map the Attack Surface.☆1,097Updated this week
- secator - the pentester's swiss knife☆1,236Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆438Dec 30, 2025Updated last month
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,464Nov 16, 2025Updated 2 months ago
- Automated pentest reporting with custom templates, project tracking, customer dashboard and client management tools. Streamline your secu…☆1,062Feb 3, 2026Updated last week
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆374Apr 6, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆3,142Mar 28, 2025Updated 10 months ago
- ☆89Feb 11, 2022Updated 4 years ago