pentesteracademy / reconpal
ReconPal: Leveraging NLP for Infosec
☆54Updated 2 years ago
Related projects: ⓘ
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆48Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆37Updated 2 years ago
- ☆14Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆77Updated 5 months ago
- ☆31Updated 2 months ago
- WordPress version identification and vulnerability finder.☆28Updated last year
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- OWASP Amass Docker Compose for setting up a full instance of the infrastructure☆22Updated this week
- BlueBox Malware analysis Box and Cyber threat intelligence.☆38Updated 2 years ago
- ☆29Updated last year
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆42Updated last week
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆39Updated last year
- InfoSec OpenAI Examples☆19Updated 9 months ago
- ☆15Updated 10 months ago
- Ransomware Simulator for testing Blue Team Detections☆34Updated 2 years ago
- Script to test NetSec capabilities.☆21Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆72Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 9 months ago
- A small tool that helps Incident responders and SOC analysts do a quick and initial analysis/assessment of malicious files☆26Updated last year
- Collection of Tools & Techniques for analyzing URLs☆30Updated 11 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆28Updated 5 months ago
- ☆12Updated 2 years ago
- Virtual Security Operations Center☆49Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 2 months ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆15Updated last year
- ☆27Updated this week
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆41Updated last year