pbnj / orthrusLinks
🛡 Monitor, analyze, & report security misconfigurations across environments.
☆18Updated 7 years ago
Alternatives and similar repositories for orthrus
Users that are interested in orthrus are comparing it to the libraries listed below
Sorting:
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 5 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- ☆25Updated 4 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Scripts for AWS amusement...☆21Updated 3 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- 🔓 Yet Another S3 Bucket Leak☆29Updated 6 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- Conference talk slides and code☆11Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- ☆14Updated 8 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆33Updated 9 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- A client/server style agent meant for testing connectivity to and from a machine on a network.☆20Updated 7 years ago
- Simple development DNS server written in python☆26Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago