infobyte / faraday_plugins
Security tools report parsers for Faradaysec.com
☆53Updated last week
Alternatives and similar repositories for faraday_plugins:
Users that are interested in faraday_plugins are comparing it to the libraries listed below
- Faraday's Command Line Interface☆45Updated 2 months ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆72Updated 3 years ago
- Faraday Agent Dispatcher launches any security tools and send results to Faradaysec Platform.☆43Updated last week
- A static website template for security pages.☆50Updated 7 months ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆20Updated 3 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆58Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- OWASP Foundation Web Respository☆35Updated 3 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆52Updated last year
- Terraform script to deploy AD-based environment on Azure☆41Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- A compilation of network scanning strategies to find vulnerable devices☆73Updated 2 years ago
- An npm package for extracting common IoC (Indicator of Compromise) from a block of text☆56Updated 2 months ago
- Useful commands for infosec☆29Updated 2 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆29Updated 3 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 10 years ago
- ☆31Updated 7 years ago
- ☆14Updated last year
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Updated 5 years ago
- WStalker: an easy proxy☆25Updated 4 years ago