Patrowl / PatrowlHears
PatrowlHears - Vulnerability Intelligence Center / Exploits
☆163Updated this week
Alternatives and similar repositories for PatrowlHears:
Users that are interested in PatrowlHears are comparing it to the libraries listed below
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆148Updated 3 years ago
- Tool to discover external and internal network attack surface☆196Updated 11 months ago
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆180Updated this week
- PatrOwl - Open Source, Free and Scalable Security Operations Orchestration Platform☆248Updated this week
- Parse .nessus file(s) and shows output in interactive UI☆150Updated last week
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆333Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated 2 months ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Swordphish Phishing Awareness Tool☆224Updated 7 months ago
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- Linux Incident Response☆90Updated 5 years ago
- PcapMonkey will provide an easy way to analyze pcap using the latest version of Suricata and Zeek.☆153Updated last month
- Weaponizing Live CT logs for automated monitoring of assets☆133Updated 3 years ago
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆165Updated 10 months ago
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 5 years ago
- Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions☆101Updated last year
- ☆43Updated 2 years ago
- Scout - a Contactless Active Reconnaissance Tool☆52Updated 2 years ago
- S2AN - Mapper of Sigma/Suricata Rules/Signatures ➡️ MITRE ATT&CK Navigator☆85Updated 2 years ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆344Updated 4 years ago
- Cloud Security Operations Orchestrator☆184Updated last year
- automated password spraying tool☆148Updated 3 years ago
- A basic phishing kit scanner for dedicated and semi-dedicated hosting☆108Updated 2 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- Typodetect☆74Updated 3 years ago