pbnj / orthrusLinks
🛡 Monitor, analyze, & report security misconfigurations across environments.
☆18Updated 7 years ago
Alternatives and similar repositories for orthrus
Users that are interested in orthrus are comparing it to the libraries listed below
Sorting:
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- 🔓 Yet Another S3 Bucket Leak☆29Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Lair Framework dockerized.☆38Updated 4 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- Scripts for AWS amusement...☆21Updated 3 years ago
- Scans for the MS17-010 vulnerability and drops the alert into slack.☆15Updated 8 years ago
- Phishing toolkit for red teams and pentesters.☆126Updated 7 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- A bunch of scripts used for network defense during competitions.☆15Updated 10 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Normalizer for honeypot data.☆45Updated 10 years ago
- Passive Spider uses search engines to find interesting information about a target domain.☆17Updated 12 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- ☆11Updated 8 years ago
- NMAP NSE that enumerates VNC authentication types☆14Updated 14 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago