owasp-amass / amass-docker-composeLinks
OWASP Amass Docker Compose for setting up a full instance of the infrastructure
☆44Updated 3 weeks ago
Alternatives and similar repositories for amass-docker-compose
Users that are interested in amass-docker-compose are comparing it to the libraries listed below
Sorting:
- ☆21Updated 2 years ago
- Installs ADDS and configures a vulnerable domain via a powershell script☆12Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆33Updated last month
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 3 months ago
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆42Updated 5 months ago
- ☆77Updated last year
- ☆39Updated 2 weeks ago
- ☆33Updated 2 months ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆32Updated this week
- Elyzer is an email header analyzer, written in python, capable of detecting potential spoofing attempts.☆41Updated 6 months ago
- Cloudformation Template to Launch the SOC from Kali Purple☆51Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆27Updated this week
- OpenBAS Docker deployment helpers☆19Updated this week
- Nuclei plugins to audit Chrome extensions☆65Updated 11 months ago
- ☆56Updated 3 weeks ago
- ☆11Updated last year
- A modular external attack surface mapping tool integrating tools for automated reconnaissance and bug bounty workflows.☆40Updated 2 months ago
- 🧰 ESXi Testing Tookit is a command-line utility designed to help security teams test ESXi detections.☆76Updated 2 months ago
- ☆10Updated 9 months ago
- Workshop & Talk Slide Decks from HackSpaceCon☆25Updated last year
- An optimized Python3 library to fetch the most recent exploit-database, create searchable indexes for CVE->EDBID and EDBID -> CVE, and pr…☆29Updated 7 months ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated 11 months ago
- ☆35Updated 2 months ago
- OWASP Foundation web repository☆36Updated 4 months ago
- A Go-based utility that processes input through multiple AI models concurrently (OpenAI, Claude, and Gemini) and provides a summarized co…☆67Updated last week
- ☆55Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆28Updated last year