dradis / dradis-ce
Dradis Framework: Collaboration and reporting for IT Security teams
☆701Updated this week
Alternatives and similar repositories for dradis-ce:
Users that are interested in dradis-ce are comparing it to the libraries listed below
- SimplE RePort wrIting and COllaboration tool☆1,095Updated 4 years ago
- Pattern recognition for hosts, services, and content☆718Updated last week
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,267Updated 2 months ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,211Updated 4 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆575Updated 7 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆631Updated 6 years ago
- network visualization & pentest reporting☆528Updated last year
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- A Python Package for Data Exfiltration☆782Updated 11 months ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆629Updated 2 years ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆943Updated 3 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆315Updated 6 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,010Updated 4 years ago
- Post Exploitation Wiki☆518Updated 5 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆508Updated 6 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆629Updated 3 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆419Updated 7 months ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆900Updated 4 years ago
- The GOSINT framework is a project used for collecting, processing, and exporting high quality indicators of compromise (IOCs).☆543Updated last year
- Domain Password Audit Tool for Pentesters☆951Updated 2 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,121Updated 5 months ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆552Updated 2 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,060Updated 4 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆504Updated 4 years ago
- Easy automated vulnerability scanning, reporting and analysis☆701Updated 5 years ago
- An asynchronous enumeration & vulnerability scanner. Run all the tools on all the hosts.☆400Updated 4 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆380Updated 7 years ago
- Smart Install Exploitation Tool☆577Updated 3 years ago
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago