dradis / dradis-ceLinks
Dradis Framework: Collaboration and reporting for IT Security teams
☆710Updated this week
Alternatives and similar repositories for dradis-ce
Users that are interested in dradis-ce are comparing it to the libraries listed below
Sorting:
- SimplE RePort wrIting and COllaboration tool☆1,099Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,279Updated 4 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆577Updated 7 years ago
- Domain Password Audit Tool for Pentesters☆963Updated 2 years ago
- Egress-Assess is a tool used to test egress data detection capabilities☆661Updated last year
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆509Updated 7 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆904Updated 4 years ago
- network visualization & pentest reporting☆530Updated 2 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆553Updated 2 years ago
- Pattern recognition for hosts, services, and content☆723Updated last month
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,013Updated 5 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 4 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆632Updated 6 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆383Updated 5 years ago
- An information security preparedness tool to do adversarial simulation.☆1,123Updated 6 years ago
- Cheat sheets for various projects.☆1,057Updated 7 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆943Updated 4 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,126Updated 6 months ago
- Issues to consider when planning a red team exercise.☆619Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 6 years ago
- Post Exploitation Wiki☆521Updated 5 years ago
- A Python Package for Data Exfiltration☆782Updated last year
- Red Team Tips as posted by @vysecurity on Twitter☆1,062Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 11 months ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Updated 7 years ago
- Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient☆1,501Updated 2 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 6 years ago