bitorscanner / BitorLinks
Bitor Scanning Software
☆383Updated last month
Alternatives and similar repositories for Bitor
Users that are interested in Bitor are comparing it to the libraries listed below
Sorting:
- 💀 Don't fear the Reaper 👻☆543Updated last week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆375Updated this week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆732Updated 2 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆531Updated this week
- The Internets #1 Subdomain Takeover Tool☆260Updated 3 weeks ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆388Updated last week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆125Updated last week
- Halberd : Multi-Cloud Agentic Attack Tool☆282Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆679Updated last week
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆942Updated 3 months ago
- ☆261Updated 7 months ago
- SOCFortress CoPilot☆287Updated this week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆307Updated last week
- An open-source self-hosted purple team management web application.☆274Updated last month
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆123Updated 4 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last week
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆257Updated last week
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆280Updated this week
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆191Updated 11 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated last year
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆651Updated 2 months ago
- Dredging up secrets from the depths of the file system☆127Updated 7 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- Open Source SIEM Stack☆95Updated 4 months ago
- ☆213Updated last year
- ☆718Updated last month
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- Red Teaming for AI and Cloud☆177Updated 3 weeks ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆427Updated this week