bitorscanner / BitorLinks
Bitor Scanning Software
☆406Updated last month
Alternatives and similar repositories for Bitor
Users that are interested in Bitor are comparing it to the libraries listed below
Sorting:
- Pen Test Report Generation and Assessment Collaboration☆560Updated 2 weeks ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆410Updated last week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆141Updated last week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆444Updated 2 weeks ago
- 💀 Don't fear the Reaper 👻☆590Updated this week
- SOCFortress CoPilot☆352Updated this week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆818Updated last week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆786Updated 2 months ago
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆364Updated 2 months ago
- The Internets #1 Subdomain Takeover Tool☆269Updated 3 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆453Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆306Updated 2 weeks ago
- Repo to hold wazuh manager mcp server☆53Updated last month
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,001Updated 5 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆182Updated last year
- Red Teaming for AI and Cloud☆196Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆386Updated 2 weeks ago
- A visual methodology tracking platform tailored for offensive security assessments☆206Updated 2 weeks ago
- Open source defense for your entire stack☆185Updated last month
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆128Updated 7 months ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆250Updated 4 months ago
- Captures network traffic app made in Rust.☆73Updated this week
- An open-source self-hosted purple team management web application.☆287Updated 3 weeks ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆587Updated 2 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆259Updated 3 months ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆711Updated last month
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆453Updated 2 weeks ago
- Speed up your pentest enumeration☆83Updated last month
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated last month
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆196Updated last year