bitorscanner / BitorLinks
Bitor Scanning Software
☆454Updated 3 months ago
Alternatives and similar repositories for Bitor
Users that are interested in Bitor are comparing it to the libraries listed below
Sorting:
- Pen Test Report Generation and Assessment Collaboration☆589Updated 2 weeks ago
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆469Updated 2 weeks ago
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆157Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆435Updated this week
- A simple-to-use IR (incident response) case management tool for tracking and documenting investigations.☆435Updated 4 months ago
- SOCFortress CoPilot☆434Updated this week
- Security automation with n8n ideas: 100+ Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.☆474Updated 4 months ago
- 💀 Don't fear the Reaper 👻☆816Updated this week
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆465Updated last year
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆898Updated 3 weeks ago
- Halberd : Multi-Cloud Agentic Attack Tool☆331Updated 3 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆723Updated 5 months ago
- CyberSecurity BLUE TEAM containerized platform that brings together open-source tools for SIEM, DFIR, CTI, SOAR, and Network Analysis☆448Updated 3 months ago
- The Internets #1 Subdomain Takeover Tool☆297Updated 8 months ago
- Repo to hold wazuh manager mcp server☆74Updated 4 months ago
- MCP Server for Wazuh SIEM☆169Updated last month
- ☆220Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆508Updated 2 weeks ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆583Updated this week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆867Updated last month
- VulnRisk - Open Source Vulnerability Risk Assessment Platform☆134Updated 2 months ago
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆527Updated this week
- An open-source self-hosted purple team management web application.☆300Updated last week
- Nmap Dashboard Mini Project☆626Updated last year
- Captures network traffic app made in Rust.☆76Updated 2 weeks ago
- Open Source SIEM Stack☆137Updated 2 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆190Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆1,017Updated 10 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆172Updated 2 weeks ago