bitorscanner / BitorLinks
Bitor Scanning Software
☆437Updated last month
Alternatives and similar repositories for Bitor
Users that are interested in Bitor are comparing it to the libraries listed below
Sorting:
- Pen Test Report Generation and Assessment Collaboration☆586Updated last week
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆433Updated last week
- 💀 Don't fear the Reaper 👻☆715Updated last week
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆154Updated 3 weeks ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆462Updated 2 weeks ago
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆121Updated last month
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆887Updated this week
- The Internets #1 Subdomain Takeover Tool☆289Updated 6 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆462Updated last year
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆513Updated this week
- SOCFortress CoPilot☆418Updated last week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆431Updated 2 months ago
- Halberd : Multi-Cloud Agentic Attack Tool☆327Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆472Updated last week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆814Updated 2 weeks ago
- CloudGrappler is a purpose-built tool designed for effortless querying of high-fidelity and single-event detections related to well-known…☆265Updated last month
- Red Teaming for AI and Cloud☆199Updated 3 weeks ago
- MCP Server for Wazuh SIEM☆153Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆719Updated 4 months ago
- A visual methodology tracking platform tailored for offensive security assessments☆235Updated 2 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆680Updated 2 months ago
- Captures network traffic app made in Rust.☆74Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆99Updated 4 months ago
- A deliberately vulnerable Microsoft Entra ID environment. Learn identity security through hands-on, realistic attack challenges.☆847Updated 2 months ago
- AuditKit - Multi-Cloud Compliance Scanner & Evidence Collection☆238Updated 2 weeks ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 11 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,012Updated 9 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆188Updated last year
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆476Updated last week
- An open-source self-hosted purple team management web application.☆295Updated 2 weeks ago