Risk-Assessment-Framework / RAF-DAST-ScannerLinks
Dast tool
☆13Updated 2 years ago
Alternatives and similar repositories for RAF-DAST-Scanner
Users that are interested in RAF-DAST-Scanner are comparing it to the libraries listed below
Sorting:
- Jupyter Univere is a search engine for all infosec jupyter notebooks☆35Updated 10 months ago
- ATT&CK Data Model (ADM): A TypeScript library for structured interaction with MITRE ATT&CK datasets. Uses Zod schemas, TypeScript types, …☆64Updated last week
- ATHF is a framework for agentic threat hunting - building systems that can remember, learn, and act with increasing autonomy.☆172Updated last week
- ReconPro is a specialized Google dorking tool designed for cybersecurity professionals and bug bounty hunters.☆44Updated 4 months ago
- Collection of Jupyter Notebooks by @fr0gger_☆191Updated last month
- OpenAEV Docker deployment helpers☆28Updated last week
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- ☆20Updated 10 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- A project to visualize the software supply chain☆58Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and remediation techniques, libraries and frameworks, E-books and vide…☆56Updated 3 years ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆338Updated last week
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆56Updated 3 months ago
- Knowledge base on cybercriminal concealment techniques☆95Updated this week
- A library of reference materials, tools, and other resources to aid threat profiling, threat quantification, and cyber adversary defense☆103Updated 2 years ago
- A CLI wrapper for libmodsecurity (v3.0.10)☆13Updated 2 years ago
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆81Updated 2 months ago
- The Art of Pivoting - Techniques for Intelligence Analysts to Discover New Relationships in a Complex World☆155Updated last month
- Useful resources about phishing email analysis☆86Updated last year
- God Mode Detection Rules☆135Updated last year
- Autonomous AI C2☆33Updated last year
- ☆285Updated 5 months ago
- ☆44Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated last week
- Autoconfigured ELK Stack That Contains All EPSS and NVD CVE Data☆64Updated last month
- Threat Intel Platform for T-POTs☆167Updated this week
- NOVA: The Prompt Pattern Matching☆90Updated 2 weeks ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated last year
- ☆60Updated 7 months ago
- ☆20Updated 4 years ago