guardicore / monkey
Infection Monkey - An open-source adversary emulation platform
☆6,757Updated 3 weeks ago
Alternatives and similar repositories for monkey:
Users that are interested in monkey are comparing it to the libraries listed below
- A Workflow Engine for Offensive Security☆5,533Updated last month
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,398Updated 6 months ago
- Open Source Vulnerability Management Platform☆5,313Updated 2 weeks ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,160Updated 9 months ago
- A swiss army knife for pentesting networks☆8,641Updated last year
- In-depth attack surface mapping and asset discovery☆12,669Updated this week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,184Updated last month
- Automated Adversary Emulation Platform☆5,964Updated this week
- A Tool for Domain Flyovers☆5,732Updated 2 years ago
- A pretty sweet vulnerability scanner☆4,113Updated 6 months ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,550Updated 4 months ago
- Automated Mass Exploiter☆5,094Updated last year
- Next generation web scanner☆5,786Updated 8 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,188Updated last week
- A curated list of tools for incident response☆8,019Updated 8 months ago
- Attack Surface Management Platform☆8,566Updated 3 weeks ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,567Updated this week
- Advanced vulnerability scanning with Nmap NSE☆3,578Updated 6 months ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆4,624Updated 4 years ago
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,135Updated 6 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,654Updated 2 weeks ago
- Web application fuzzer☆6,110Updated 7 months ago
- A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT S…☆2,665Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,359Updated this week
- Windows Exploit Suggester - Next Generation☆4,358Updated this week
- File upload vulnerability scanner and exploitation tool.☆3,180Updated last year
- Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)☆7,391Updated last month
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,075Updated 11 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,568Updated 5 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,219Updated 5 months ago