pentesteracademy / reconpalLinks
ReconPal: Leveraging NLP for Infosec
☆56Updated 3 years ago
Alternatives and similar repositories for reconpal
Users that are interested in reconpal are comparing it to the libraries listed below
Sorting:
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆21Updated 2 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- ☆78Updated last year
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆31Updated last year
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated 2 years ago
- ☆32Updated 2 years ago
- ☆34Updated 2 years ago
- ☆36Updated 3 years ago
- Enumerate AWS permissions and resources.☆70Updated 3 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆107Updated 3 months ago
- Virtual Security Operations Center☆51Updated 2 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆52Updated last year
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated 2 years ago
- ☆13Updated 3 years ago
- Azure AD enumeration over MS Graph☆83Updated 2 years ago
- BlueBox Malware analysis Box and Cyber threat intelligence.☆43Updated 3 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated 2 years ago
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago