dradis / dradis-ce
Dradis Framework: Collaboration and reporting for IT Security teams
☆698Updated this week
Alternatives and similar repositories for dradis-ce:
Users that are interested in dradis-ce are comparing it to the libraries listed below
- SimplE RePort wrIting and COllaboration tool☆1,096Updated 4 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆721Updated 5 years ago
- Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.☆562Updated 2 years ago
- Domain Password Audit Tool for Pentesters☆949Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,266Updated 2 months ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆551Updated 2 years ago
- network visualization & pentest reporting☆528Updated last year
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆897Updated 3 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆574Updated 7 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,209Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,011Updated 4 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- Pattern recognition for hosts, services, and content☆697Updated this week
- A collection of Red Team focused tools, scripts, and notes☆1,120Updated 4 months ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,055Updated 4 years ago
- A Python Package for Data Exfiltration☆776Updated 10 months ago
- A default credential scanner.☆1,475Updated 3 years ago
- Post Exploitation Wiki☆516Updated 5 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆940Updated 3 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆381Updated 5 years ago
- Issues to consider when planning a red team exercise.☆615Updated 7 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆629Updated 2 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆544Updated last year
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated 9 months ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆1,037Updated 4 months ago
- This function runs a number of checks on a system to help provide situational awareness to a penetration tester during the reconnaissance…☆444Updated 7 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 5 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆642Updated last year