migolovanov / wtt
Simple script to test WAFs
☆12Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for wtt
- Parse .nessus file(s) and shows output in interactive UI☆146Updated 6 months ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆30Updated last year
- Network assessment tool for various UDP Services covering both IPv4 and IPv6 protocols☆115Updated 4 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆159Updated 2 weeks ago
- Extensible framework for analyzing publicly available information about vulnerabilities☆105Updated this week
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- Automatically exported from code.google.com/p/nipper-ng☆66Updated 2 years ago
- ☆42Updated last year
- A Zeek Network Security Monitor tutorial that will cover the basics of creating a Zeek instance on your network in addition to all of the…☆61Updated 2 years ago
- NessusV2 File Parser☆65Updated 2 years ago
- APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploit…☆60Updated 6 years ago
- MITRE Engage™ is a framework for conducting Denial, Deception, and Adversary Engagements.☆60Updated 7 months ago
- Fast offline auditing of Active Directory passwords using Python.☆160Updated 2 months ago
- Tool to discover external and internal network attack surface☆192Updated 5 months ago
- pentest-standard.org docs redesign☆39Updated 2 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆152Updated last year
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a Microsoft …☆95Updated 4 months ago
- Identify IP addresses owned by public cloud providers☆112Updated 4 months ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆71Updated 2 years ago
- A Docker container for remote penetration testing.☆133Updated 3 years ago
- Agent scanner for vulners.com☆86Updated last month
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated 3 weeks ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆31Updated last year
- Simulating Adversary Operations☆93Updated 6 years ago
- Detections for CVE-2021-44228 inside of nested binaries☆34Updated 2 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆138Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- Web app that provides basic navigation and annotation of ATT&CK matrices☆57Updated 4 years ago
- Elasticsearch for Offensive Security☆138Updated 4 years ago