owasp-amass / amass-docker-compose
OWASP Amass Docker Compose for setting up a full instance of the infrastructure
☆43Updated last month
Alternatives and similar repositories for amass-docker-compose
Users that are interested in amass-docker-compose are comparing it to the libraries listed below
Sorting:
- ☆31Updated last month
- ☆34Updated last year
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 8 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated last month
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated last month
- ☆26Updated 8 months ago
- ☆20Updated last year
- Cloud subdomains identification tool☆58Updated last month
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- A structured red-team prompt for generating ethical hacking tools using AI - designed for use in labs, CTFs, and authorized security asse…☆13Updated last month
- OAuth 2.0 exploitation, attack and research tools.☆11Updated last year
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆40Updated 5 months ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆39Updated 3 months ago
- ☆12Updated 3 years ago
- A not-curated list of cloud hacking labs☆25Updated last year
- OWASP Foundation web repository☆32Updated 3 months ago
- ☆22Updated 4 years ago
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated 11 months ago
- A network logging tool that logs per process activities☆32Updated last year
- Challenge Python☆19Updated 2 years ago
- Computes the hashes of a favicon file and provides the search syntax for Shodan, Censys and Zoomeye☆44Updated last year
- Automated tool for domains & Subdomains Gathering☆13Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- ☆77Updated last year
- ☆35Updated last month
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆35Updated last month
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago