guardicore / monkeyLinks
Infection Monkey - An open-source adversary emulation platform
☆6,939Updated 9 months ago
Alternatives and similar repositories for monkey
Users that are interested in monkey are comparing it to the libraries listed below
Sorting:
- Open Source Vulnerability Management Platform☆6,236Updated last week
- Merlin is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in golang.☆5,489Updated 9 months ago
- A high performance offensive security tool for reconnaissance and vulnerability scanning☆3,505Updated 7 months ago
- A pretty sweet vulnerability scanner☆4,146Updated last year
- Attack Surface Management Platform☆9,361Updated 3 weeks ago
- Automated Adversary Emulation Platform☆6,717Updated this week
- A Modern Orchestration Engine for Security☆6,070Updated this week
- A swiss army knife for pentesting networks☆9,047Updated 2 years ago
- People tracker on the Internet: OSINT analysis and research tool by Jose Pino☆8,573Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,523Updated 3 months ago
- Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run yo…☆3,928Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆10,105Updated 4 months ago
- Automated Mass Exploiter☆5,205Updated 2 years ago
- Network Analysis Tool☆3,323Updated 2 years ago
- Open-Source Phishing Toolkit☆13,538Updated last year
- Six Degrees of Domain Admin☆10,529Updated 6 months ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,478Updated last year
- Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management☆4,808Updated this week
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,554Updated 2 weeks ago
- IntelOwl: manage your Threat Intelligence at scale☆4,432Updated last week
- Domain name permutation engine for detecting homograph phishing attacks, typo squatting, and brand impersonation☆5,572Updated 9 months ago
- Ah shhgit! Find secrets in your code. Secrets detection for your GitHub, GitLab and Bitbucket repositories.☆3,941Updated 11 months ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,897Updated last year
- reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via E…☆8,455Updated 2 months ago
- Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malsh…☆3,523Updated 2 weeks ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆4,790Updated 6 months ago
- In-depth attack surface mapping and asset discovery☆14,073Updated this week
- ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.☆2,435Updated 7 months ago
- Red Team's SIEM - tool for Red Teams used for tracking and alarming about Blue Team activities as well as better usability in long term o…☆2,614Updated last month
- Real-time HTTP Intrusion Detection☆3,084Updated last year