oasm-platform / open-asmLinks
Open-source platform for cybersecurity Attack Surface Management (OASM).
☆57Updated this week
Alternatives and similar repositories for open-asm
Users that are interested in open-asm are comparing it to the libraries listed below
Sorting:
- First iteration of ML based Feedback WAF☆59Updated last year
- 🌒 Shell command obfuscation to avoid detection systems☆122Updated 3 years ago
- Burp Suite Extension with MCP Server to enhance manual application security testing☆33Updated 2 weeks ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆47Updated 3 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 2 years ago
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆45Updated 3 weeks ago
- Database interaction layer to store the Open Asset Model in a database management system☆19Updated last week
- A multi-agent SOC/DFIR assistant powered by LangChain, LangGraph, and OpenAI models. Automates IOC extraction, MITRE ATT&CK mapping, CVE …☆62Updated last month
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆65Updated 2 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated last year
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Updated 2 years ago
- Automatic security vulnerability remediation for your code.☆64Updated this week
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆27Updated last year
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated 2 years ago
- A YARA rule generator☆61Updated this week
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- Fast, simple library in Go to fetch CVEs from the National Vulnerability Database feeds☆29Updated 2 years ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆69Updated last year
- Curated list of categorized User Agents☆109Updated 2 weeks ago
- CVE-2025-1974☆90Updated 10 months ago
- Trends Website (URL) from Twitter hackers.☆112Updated this week
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- IoT and Operational Technology Honeypot☆105Updated 2 years ago
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆20Updated last year
- Website defacement attack detection with deep learning☆62Updated last year
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Updated 6 years ago
- Exposor is a tool using internet search engines to detect exposed technologies with a unified syntax.☆65Updated 2 months ago
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆119Updated 2 years ago
- Web access logs analyzer - provides an insight on how remote hosts behave☆15Updated 4 years ago