orbitscanner / Bitor
Bitor Scanning Software
☆359Updated this week
Alternatives and similar repositories for Bitor:
Users that are interested in Bitor are comparing it to the libraries listed below
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆325Updated last week
- Pen Test Report Generation and Assessment Collaboration☆501Updated last week
- The Internets #1 Subdomain Takeover Tool☆242Updated 2 months ago
- 💀 Don't fear the Reaper 👻☆486Updated this week
- Automation tool for Windows Deception Host Burn-In☆84Updated 3 months ago
- SOCFortress CoPilot☆265Updated this week
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆115Updated this week
- ☆258Updated 4 months ago
- Misconfig Mapper is a fast tool to help you uncover security misconfigurations on popular third-party services used by your company and/o…☆692Updated this week
- Halberd : Multi-Cloud Attack Platform☆256Updated 3 weeks ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆270Updated 2 weeks ago
- PurpleLab is an efficient and readily deployable lab solution, providing a swift setup for cybersecurity professionals to test detection…☆640Updated this week
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆79Updated 2 months ago
- Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time thre…☆620Updated this week
- A simple application that extracts your IoCs from garbage input and checks their reputation using multiple CTI services.☆328Updated this week
- Open Source SIEM Stack☆82Updated last month
- ☆209Updated 10 months ago
- Open Breach and Attack Simulation & Security Validation Platform☆966Updated this week
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆192Updated 2 months ago
- Splunk add-on related to the PurpleLab tool☆38Updated 11 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆174Updated 10 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆227Updated last week
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆215Updated 6 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆447Updated last year
- Threat-hunting tool for Linux☆808Updated last month
- Enterprise-ready SIEM, SOAR and Compliance powered by real-time correlation and threat intelligence.☆249Updated this week
- Deep Linux runtime visibility meets Wireshark☆287Updated last month
- An open-source self-hosted purple team management web application.☆265Updated this week
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Updated 8 months ago
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆184Updated 9 months ago