Telefonica / OMLASP
OMLASP (Ideas Locas)
☆22Updated 2 years ago
Alternatives and similar repositories for OMLASP:
Users that are interested in OMLASP are comparing it to the libraries listed below
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- OWASP Foundation Web Respository☆35Updated 3 years ago
- ☆24Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- ☆14Updated 4 years ago
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 5 months ago
- A simple program to query nmap xml files in the terminal.☆27Updated 4 years ago
- ☆19Updated last year
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Active DIrectory Lab for Pentesting Practice☆24Updated 2 years ago
- SecurityBsides Roma Conference Repo☆10Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- IOCPARSER.COM is a Fast and Reliable service that enables you to extract IOCs and intelligence from different data sources.☆34Updated 3 years ago
- AI modular structure that provides automation-based attack and penetration☆14Updated 10 months ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- Red Team Server (RTS)☆16Updated last year
- ☆42Updated 2 years ago
- S3 bucket enumerator☆29Updated 5 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated 2 years ago
- ☆27Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 8 months ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago