pentesteracademy / reconpalLinks
ReconPal: Leveraging NLP for Infosec
☆57Updated 3 years ago
Alternatives and similar repositories for reconpal
Users that are interested in reconpal are comparing it to the libraries listed below
Sorting:
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 2 years ago
- ☆21Updated 2 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- ☆32Updated 2 years ago
- A network logging tool that logs per process activities☆32Updated 2 years ago
- ☆77Updated last year
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆52Updated last year
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- CIS Benchmark testing of Windows SIEM configuration☆44Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated 2 years ago
- Melee: Tool to Detect Infections in MySQL Instances☆22Updated last year
- Google Meet Phishing Template For Gophish☆45Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆27Updated 2 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- Azure AD enumeration over MS Graph☆82Updated 2 years ago
- ☆36Updated 3 years ago
- ☆34Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated 10 months ago
- Virtual Security Operations Center☆51Updated last year
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 11 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- BlueBox Malware analysis Box and Cyber threat intelligence.☆42Updated 3 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- Just another vulnerable web application.☆36Updated 11 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- ☆80Updated 2 years ago