pentesteracademy / reconpalLinks
ReconPal: Leveraging NLP for Infosec
☆56Updated 3 years ago
Alternatives and similar repositories for reconpal
Users that are interested in reconpal are comparing it to the libraries listed below
Sorting:
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- Red Team tools, infrastructure, and hardware weaponized☆107Updated 3 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- ☆34Updated 2 years ago
- ☆13Updated 3 years ago
- ☆22Updated 2 years ago
- ☆32Updated 2 years ago
- Virtual Security Operations Center☆51Updated 2 years ago
- ☆36Updated 3 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- Script to test NetSec capabilities.☆21Updated 2 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- CIS Benchmark testing of Windows SIEM configuration☆45Updated 2 years ago
- Shodan Monitoring integration for TheHive.☆131Updated 9 months ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- ☆78Updated last year
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- ☆94Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- New Framework Red Team Operations☆18Updated 4 years ago