pbnj / orthrusLinks
🛡 Monitor, analyze, & report security misconfigurations across environments.
☆18Updated 7 years ago
Alternatives and similar repositories for orthrus
Users that are interested in orthrus are comparing it to the libraries listed below
Sorting:
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- ☆25Updated 4 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- ☆11Updated 8 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Updated 7 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Conference talk slides and code☆11Updated 5 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- This cookbook installs Nexpose☆12Updated last year
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 5 years ago
- 🔓 Yet Another S3 Bucket Leak☆29Updated 7 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago