OWASP / SecureTea-Project
The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)
☆297Updated last year
Alternatives and similar repositories for SecureTea-Project:
Users that are interested in SecureTea-Project are comparing it to the libraries listed below
- The Secure Coding Framework☆268Updated 4 years ago
- ☆92Updated 11 months ago
- OWASP Honeypot, Automated Deception Framework.☆460Updated 7 months ago
- Python framework to automatically discover and enumerate hosts from different back-end systems (Shodan, Censys)☆297Updated 3 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- ADAPT is a tool that performs automated Penetration Testing for WebApps.☆189Updated 5 years ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 3 years ago
- Dradis Framework: Collaboration and reporting for IT Security teams☆700Updated this week
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆412Updated last year
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- The ZAP Heads Up Display (HUD)☆262Updated 2 months ago
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆247Updated 2 weeks ago
- A modular OSINT honeypot for blue teamers☆333Updated last year
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 4 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆418Updated 6 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆350Updated 4 years ago
- DejaVU - Open Source Deception Framework☆410Updated 2 years ago
- An installable desktop variant of OWASP Threat Dragon☆594Updated 5 months ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,267Updated 2 months ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- DFIRTrack - The Incident Response Tracking Application☆498Updated 7 months ago
- FATT /fingerprintAllTheThings - a pyshark based script for extracting network metadata and fingerprints from pcap files and live network …☆664Updated last year
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆279Updated 2 weeks ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆179Updated this week
- This project is about creating and publishing threat model examples.☆419Updated 3 years ago
- Security event correlation engine for ELK stack☆439Updated 9 months ago
- The Open-Source AWS Cyber Range☆486Updated 4 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Updated 2 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆629Updated 3 years ago