Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.
☆425Mar 13, 2026Updated last week
Alternatives and similar repositories for armory
Users that are interested in armory are comparing it to the libraries listed below
Sorting:
- ANWI - All New Wireless IDS☆29Aug 3, 2018Updated 7 years ago
- Android Automation Tool☆21May 9, 2018Updated 7 years ago
- Chiron - An IPv6 Security Assessment framework with advanced IPv6 Extension Headers manipulation capabilities.☆210Nov 16, 2018Updated 7 years ago
- a CLI for ephemeral penetration testing☆16Dec 10, 2019Updated 6 years ago
- Mallet is an intercepting proxy for arbitrary protocols☆289Apr 14, 2025Updated 11 months ago
- [BHUSA 2018 Arsenal] Integrated tool to analyze Drive-by Download attack☆107Jan 6, 2023Updated 3 years ago
- Platform Firmware Auditing Tool☆131Sep 7, 2018Updated 7 years ago
- Tool for introspection of SSL\TLS sessions☆146Updated this week
- PROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK☆223Apr 15, 2019Updated 6 years ago
- Burp extension to help developers replicate findings from pen tests☆70Jul 22, 2024Updated last year
- snake - a malware storage zoo☆217Jul 11, 2023Updated 2 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Dec 8, 2022Updated 3 years ago
- A Microservices-based framework for the study of Network Security and Penetration Test techniques☆628Mar 13, 2026Updated last week
- First IDE for Nmap Script (NSE) Development.☆359Aug 8, 2020Updated 5 years ago
- Pre-OS microcode updater☆43Aug 25, 2018Updated 7 years ago
- ☆79Aug 4, 2022Updated 3 years ago
- ☆137Mar 20, 2019Updated 7 years ago
- A framework for stealthy domain reconnaissance☆301Oct 14, 2021Updated 4 years ago
- WEB SERVICE SECURITY ASSESSMENT TOOL☆390Sep 24, 2021Updated 4 years ago
- An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the r…☆3,234Nov 20, 2025Updated 4 months ago
- DejaVU - Open Source Deception Framework☆426Aug 2, 2025Updated 7 months ago
- HTA encryption tool for RedTeams☆1,421Nov 9, 2022Updated 3 years ago
- SMB MiTM tool with a focus on attacking clients through file content swapping, lnk swapping, as well as compromising any data passed over…☆383Aug 17, 2018Updated 7 years ago
- Active Directory Assessment and Privilege Escalation Script☆1,127Dec 7, 2022Updated 3 years ago
- tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis☆164Mar 15, 2018Updated 8 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Oct 21, 2022Updated 3 years ago
- TROMMEL: Sift Through Embedded Device Files to Identify Potential Vulnerable Indicators☆214Jun 23, 2020Updated 5 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆320Jan 3, 2026Updated 2 months ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆510Apr 22, 2018Updated 7 years ago
- Remote Recon and Collection☆460Nov 23, 2017Updated 8 years ago
- Open source Active Directory security audit framework.☆137Jan 15, 2018Updated 8 years ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,622Jan 23, 2024Updated 2 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,213Sep 14, 2020Updated 5 years ago
- Powershell script for enumerating vulnerable DCOM Applications☆266Nov 30, 2018Updated 7 years ago
- Powershell module to get the NetNTLMv2 hash of the current user☆96Jul 5, 2022Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- An asynchronous, collaborative post-exploitation agent powered by Python and .NET's DLR☆2,329Dec 6, 2023Updated 2 years ago
- LinkedInt: A LinkedIn scraper for reconnaissance during adversary simulation☆488May 23, 2023Updated 2 years ago
- A highly configurable Framework for easy automated web scanning☆382Jul 13, 2020Updated 5 years ago