Risk-Assessment-Framework / Raf-ScannerLinks
Raf Scanner IDE
☆11Updated 2 years ago
Alternatives and similar repositories for Raf-Scanner
Users that are interested in Raf-Scanner are comparing it to the libraries listed below
Sorting:
- The Secure Coding Framework☆22Updated 5 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆22Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Dependency Combobulator☆93Updated last year
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Source for public Cobalt external product documentation☆14Updated this week
- GoPhishReport is a penetration testing and red teaming tool that creates custom phishing campaign reports for GoPhish phishing campaigns …☆13Updated last year
- Azure Deployment Templates for Mandiant Managed Huning☆11Updated 2 years ago
- ☆42Updated 5 months ago
- Virtual Security Operations Center☆51Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ATLAS - Malware Analysis Description☆21Updated 2 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆31Updated last year
- Maturity Model Collaborative project☆15Updated 2 years ago
- An example of a mis-configured Rails application release under MIT license.☆20Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- Nessus Audit files☆33Updated 2 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆32Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- AWS Security Checks☆40Updated 7 years ago
- Cobalt Strike/C2 Servers☆13Updated 4 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 3 years ago
- ☆17Updated 5 months ago
- This script is to build Wazuh 4.3 environment☆11Updated 3 years ago
- Bug Bounty Monitor☆14Updated 4 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆19Updated 4 years ago
- A tool to assist with network-based hunting for GRU's Drovorub malware c2☆25Updated 5 years ago
- ☆90Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago