guardicore / monkeyLinks
Infection Monkey - An open-source adversary emulation platform
☆6,909Updated 7 months ago
Alternatives and similar repositories for monkey
Users that are interested in monkey are comparing it to the libraries listed below
Sorting:
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,425Updated last month
- Open Source Vulnerability Management Platform☆6,049Updated this week
- Automated Mass Exploiter☆5,173Updated 2 years ago
- A pretty sweet vulnerability scanner☆4,147Updated last year
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,448Updated 7 months ago
- Advanced vulnerability scanning with Nmap NSE☆3,689Updated last year
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,267Updated 5 months ago
- A swiss army knife for pentesting networks☆8,989Updated 2 years ago
- A Workflow Engine for Offensive Security☆5,977Updated 4 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,176Updated last year
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,434Updated last year
- NSE script based on Vulners.com API☆3,359Updated 2 months ago
- Attack Surface Management Platform☆9,258Updated 2 months ago
- Automated Adversary Emulation Platform☆6,593Updated last week
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,928Updated 9 months ago
- Empire is a PowerShell and Python post-exploitation agent.☆7,743Updated 5 years ago
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,767Updated this week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,963Updated 2 months ago
- Create randomly insecure VMs☆2,718Updated 2 months ago
- In-depth attack surface mapping and asset discovery☆13,833Updated last week
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,312Updated 3 weeks ago
- Impacket is a collection of Python classes for working with network protocols.☆15,173Updated last week
- Six Degrees of Domain Admin☆10,454Updated 4 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,539Updated last week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,357Updated last week
- Windows Exploit Suggester - Next Generation☆4,706Updated last week
- Open-Source Phishing Toolkit☆13,338Updated last year
- Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices☆11,850Updated this week
- Malwoverview is a first response tool used for threat hunting and offers intel information from Virus Total, Hybrid Analysis, URLHaus, Po…☆3,469Updated last month
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,880Updated this week