Risk-Assessment-Framework / Raf-ScannerLinks
Raf Scanner IDE
☆11Updated 2 years ago
Alternatives and similar repositories for Raf-Scanner
Users that are interested in Raf-Scanner are comparing it to the libraries listed below
Sorting:
- The Secure Coding Framework☆22Updated 5 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Virtual Security Operations Center☆51Updated 2 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Bug Bounty Monitor☆14Updated 4 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆33Updated 3 years ago
- ☆17Updated 5 months ago
- Nessus Audit files☆33Updated 2 years ago
- A Smart Log4Shell/Log4j/CVE-2021-44228 Scanner☆14Updated 3 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- ☆42Updated 5 months ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- This tool gives developers, researchers and companies the ability to analyze software packages of different programming languages that ar…☆69Updated 4 years ago
- Dependency Combobulator☆93Updated last year
- ☆19Updated 4 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- A python tool which runs to display random publicly disclosed Hackerone reports when bored. Automatically opens the report in browser.(Ad…☆42Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A fun POC that is built to understand AI security agents.☆33Updated 9 months ago
- Post-exploitation tool☆26Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆13Updated 3 years ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- GCP Audit checks projects in Google Cloud for compliance with CIS Benchmarks☆27Updated 4 months ago