orbitscanner / Bitor
Bitor Scanning Software
☆376Updated last month
Alternatives and similar repositories for Bitor
Users that are interested in Bitor are comparing it to the libraries listed below
Sorting:
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆336Updated 2 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆520Updated last week
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆722Updated last week
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆122Updated last week
- The Internets #1 Subdomain Takeover Tool☆249Updated 4 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆449Updated last year
- 💀 Don't fear the Reaper 👻☆508Updated last week
- A powerful scanner to scan your Filesystem, S3, MySQL, Redis, Google Cloud Storage and Firebase storage for PII and sensitive data.☆332Updated 3 weeks ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆120Updated 3 months ago
- Halberd : Multi-Cloud Attack Tool☆273Updated this week
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆664Updated this week
- ☆259Updated 5 months ago
- Mantis is a security framework that automates the workflow of discovery, reconnaissance, and vulnerability scanning.☆938Updated last month
- SOCFortress CoPilot☆275Updated this week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆194Updated 4 months ago
- Open Source SIEM Stack☆88Updated 2 months ago
- Splunk add-on related to the PurpleLab tool☆39Updated last year
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆241Updated 2 weeks ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆174Updated 11 months ago
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆385Updated this week
- Open Adversary Exposure Validation Platform☆1,020Updated this week
- "Bob the Smuggler": A tool that leverages HTML Smuggling Attack and allows you to create HTML files with embedded 7z/zip archives. The to…☆536Updated 2 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆294Updated this week
- Automation tool for Windows Deception Host Burn-In☆86Updated 5 months ago
- Generate a MITRE ATT&CK Navigator based on a list of CVEs. Database with CVE, CWE, CAPEC, and MITRE ATT&CK Techniques data is updated dai…☆141Updated this week
- Nmap Dashboard Mini Project☆584Updated 11 months ago
- An open-source self-hosted purple team management web application.☆269Updated this week
- Speed up your pentest enumeration☆83Updated last week
- ☆117Updated 2 weeks ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated 11 months ago