dradis / dradis-ceLinks
Dradis Framework: Collaboration and reporting for IT Security teams
☆776Updated last week
Alternatives and similar repositories for dradis-ce
Users that are interested in dradis-ce are comparing it to the libraries listed below
Sorting:
- SimplE RePort wrIting and COllaboration tool☆1,115Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,313Updated last year
- Pattern recognition for hosts, services, and content☆757Updated 3 weeks ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆947Updated 4 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Updated 8 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,035Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,142Updated 6 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆319Updated 6 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆728Updated 6 years ago
- A Python Package for Data Exfiltration☆806Updated 7 months ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Updated 4 years ago
- network visualization & pentest reporting☆531Updated 2 years ago
- Network reconnaissance and vulnerability assessment tools.☆400Updated 4 years ago
- DejaVU - Open Source Deception Framework☆424Updated 6 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,212Updated 5 years ago
- dnsenum is a perl script that enumerates DNS information☆674Updated 6 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆924Updated 4 years ago
- Create actionable data from your Vulnerability Scans☆1,396Updated 3 years ago
- Easy automated vulnerability scanning, reporting and analysis☆709Updated 6 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆889Updated 6 years ago
- Domain Password Audit Tool for Pentesters☆1,022Updated last month
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆628Updated 7 years ago
- The IKE Scanner☆408Updated last year
- Post Exploitation Wiki☆526Updated 6 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆828Updated 8 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆383Updated 8 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,068Updated 5 years ago
- Pipal, THE password analyser☆660Updated 2 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆652Updated 3 years ago