dradis / dradis-ceLinks
Dradis Framework: Collaboration and reporting for IT Security teams
☆763Updated last week
Alternatives and similar repositories for dradis-ce
Users that are interested in dradis-ce are comparing it to the libraries listed below
Sorting:
- SimplE RePort wrIting and COllaboration tool☆1,113Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,306Updated 10 months ago
- Pattern recognition for hosts, services, and content☆748Updated last week
- A Python Package for Data Exfiltration☆803Updated 5 months ago
- The Correlated CVE Vulnerability And Threat Intelligence Database API☆945Updated 4 years ago
- "Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security …☆1,029Updated 5 years ago
- dnsenum is a perl script that enumerates DNS information☆671Updated 6 years ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,215Updated 5 years ago
- Generate vulnerable virtual machines on the fly (current team development is taking place in the cliffe/SecGen fork)☆320Updated 6 years ago
- A ruby script that scans for vulnerable & exploitable 3rd-party web applications on a network☆573Updated 8 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆649Updated 4 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆726Updated 5 years ago
- Automate creating resilient, disposable, secure and agile infrastructure for Red Teams.☆921Updated 4 years ago
- An information security preparedness tool to do adversarial simulation.☆1,140Updated 6 years ago
- DejaVU - Open Source Deception Framework☆422Updated 4 months ago
- Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Dir…☆1,616Updated last year
- Use unicornscan to quickly scan all open ports, and then pass the open ports to nmap for detailed scans.☆629Updated 7 years ago
- Domain Password Audit Tool for Pentesters☆1,007Updated last month
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆651Updated 3 years ago
- Easy automated vulnerability scanning, reporting and analysis☆707Updated 5 years ago
- Interview questions to screen offensive (red team/pentest) candidates☆886Updated 6 years ago
- network visualization & pentest reporting☆530Updated 2 years ago
- Create actionable data from your Vulnerability Scans☆1,396Updated 2 years ago
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆567Updated 5 months ago
- Post Exploitation Collection☆1,573Updated 5 years ago
- Lair is a reactive attack collaboration framework and web application built with meteor.☆384Updated 5 years ago
- (extensible) Data Exfiltration Toolkit (DET)☆831Updated 8 years ago
- GoLismero - The Web Knife☆890Updated 5 years ago
- A script for credentials-based attack surface enumeration and general reconnaissance of massive networks☆468Updated 5 months ago