factionsecurity / factionLinks
Pen Test Report Generation and Assessment Collaboration
☆536Updated this week
Alternatives and similar repositories for faction
Users that are interested in faction are comparing it to the libraries listed below
Sorting:
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆944Updated 3 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆741Updated this week
- 💀 Don't fear the Reaper 👻☆553Updated last week
- Bitor Scanning Software☆387Updated 2 weeks ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆639Updated last year
- Nmap Dashboard Mini Project☆599Updated last year
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆702Updated last week
- The Internets #1 Subdomain Takeover Tool☆261Updated last month
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆400Updated this week
- Reconmap is a collaboration-first security operations platform for infosec teams and MSSPs, enabling end‑to‑end engagement management, fr…☆765Updated last week
- Pentest Report Generator☆411Updated last month
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆383Updated last week
- secator - the pentester's swiss knife☆1,119Updated 2 weeks ago
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆704Updated 8 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆259Updated last month
- Compiled tools for internal assessments☆334Updated this week
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆548Updated 4 months ago
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆125Updated last month
- Halberd : Multi-Cloud Agentic Attack Tool☆295Updated 2 weeks ago
- An offensive data enrichment pipeline☆766Updated this week
- ☆721Updated 2 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆124Updated 5 months ago
- A customizable and powerful penetration testing reporting platform for offensive security professionals. Simplify, customize, and automat…☆2,012Updated this week
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆654Updated 3 months ago
- A humble, and 𝗳𝗮𝘀𝘁, security-oriented HTTP headers analyzer.☆319Updated this week
- Damn Vulnerable Restaurant is an intentionally vulnerable Web API game for learning and training purposes dedicated to developers, ethica…☆704Updated 3 months ago
- MasterParser is a powerful DFIR tool designed for analyzing and parsing Linux logs☆733Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆317Updated this week
- ☆313Updated last year