guardicore / monkeyLinks
Infection Monkey - An open-source adversary emulation platform
☆6,849Updated 3 months ago
Alternatives and similar repositories for monkey
Users that are interested in monkey are comparing it to the libraries listed below
Sorting:
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,353Updated 4 months ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,745Updated 3 weeks ago
- Automated Adversary Emulation Platform☆6,354Updated last week
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,317Updated 10 months ago
- A Workflow Engine for Offensive Security☆5,841Updated 2 weeks ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,913Updated 5 months ago
- Attack Surface Management Platform☆8,973Updated 2 months ago
- In-depth attack surface mapping and asset discovery☆13,437Updated 2 weeks ago
- A pretty sweet vulnerability scanner☆4,140Updated 10 months ago
- Open Source Vulnerability Management Platform☆5,891Updated 3 weeks ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,221Updated 2 months ago
- Automated Mass Exploiter☆5,153Updated 2 years ago
- A swiss army knife for pentesting networks☆8,866Updated last year
- Adversary Emulation Framework☆9,824Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10,890Updated last week
- Six Degrees of Domain Admin☆10,297Updated 3 weeks ago
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,099Updated 6 months ago
- Network Analysis Tool☆3,271Updated 2 years ago
- Advanced vulnerability scanning with Nmap NSE☆3,647Updated 11 months ago
- Windows Exploit Suggester - Next Generation☆4,585Updated this week
- IntelOwl: manage your Threat Intelligence at scale☆4,273Updated this week
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,696Updated 3 weeks ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,398Updated this week
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,718Updated last week
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,368Updated 11 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,792Updated last month
- Official Black Hat Arsenal Security Tools Repository☆4,120Updated 11 months ago
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆11,708Updated this week
- Nishang - Offensive PowerShell for red team, penetration testing and offensive security.☆9,402Updated last year
- Create randomly insecure VMs☆2,700Updated last month