pbnj / orthrusLinks
🛡 Monitor, analyze, & report security misconfigurations across environments.
☆18Updated 7 years ago
Alternatives and similar repositories for orthrus
Users that are interested in orthrus are comparing it to the libraries listed below
Sorting:
- 🔓 Yet Another S3 Bucket Leak☆29Updated 6 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆11Updated 9 years ago
- Docker container for Zachary Rice Gitleaks☆20Updated 5 years ago
- A tool to visually snapshot a website by supplying multiple user-agent. Designed to aid in discovery of different entry points into an ap…☆31Updated 9 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Scripts to query local admins quickly☆9Updated 9 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 7 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- A framework for automating penetration testing using a plugin based architecture☆38Updated 3 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 5 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- post-exploitation tools☆15Updated 7 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 7 years ago
- Vulnerable Grails application☆43Updated 10 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago