guardicore / monkeyLinks
Infection Monkey - An open-source adversary emulation platform
☆6,895Updated 6 months ago
Alternatives and similar repositories for monkey
Users that are interested in monkey are comparing it to the libraries listed below
Sorting:
- Automated Mass Exploiter☆5,167Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,918Updated last month
- Open Source Vulnerability Management Platform☆6,023Updated last month
- A Workflow Engine for Offensive Security☆5,953Updated 3 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,260Updated 5 months ago
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,419Updated 7 months ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,404Updated last month
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,280Updated this week
- A swiss army knife for pentesting networks☆8,973Updated last year
- Automated Adversary Emulation Platform☆6,538Updated this week
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,843Updated last week
- Adversary Emulation Framework☆10,210Updated last week
- Attack Surface Management Platform☆9,207Updated last month
- Empire is a PowerShell and Python post-exploitation agent.☆7,723Updated 5 years ago
- A pretty sweet vulnerability scanner☆4,145Updated last year
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,518Updated last week
- Web application fuzzer☆6,336Updated last year
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,926Updated 8 months ago
- AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.☆5,793Updated this week
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,411Updated last year
- Network Analysis Tool☆3,300Updated 2 years ago
- Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.☆8,725Updated 2 years ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,587Updated this week
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,783Updated 5 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,741Updated 3 months ago
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,459Updated last week
- A list of public penetration test reports published by several consulting firms and academic security groups.☆9,211Updated last month
- Malicious traffic detection system☆7,706Updated this week
- Next generation web scanner☆6,181Updated 3 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,352Updated this week