purpleteam-labs / purpleteamLinks
CLI component of OWASP PurpleTeam
☆132Updated last year
Alternatives and similar repositories for purpleteam
Users that are interested in purpleteam are comparing it to the libraries listed below
Sorting:
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆158Updated 4 years ago
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆105Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Dependency Combobulator☆93Updated last year
- VMC: a Scalable, Open Source and Free Vulnerability Management Platform☆91Updated 6 months ago
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- ☆112Updated 2 years ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆66Updated last month
- Jimi is an automation first no-code platform designed and developed originally for Security Orchestration and Response. Since its launch …☆166Updated last year
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Updated 4 years ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆292Updated last week
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆50Updated this week
- Curated list of security tools☆66Updated last year
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆189Updated last year
- This repository provides a comprehensive collection of Pulumi scenarios utilized by cnappgoat☆21Updated 6 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 months ago
- Desktop variant of OWASP Threat Dragon☆77Updated 4 years ago
- An open-source, real-time Security Information & Event Management tool based on big data technologies, providing a scalable, advanced sec…☆207Updated 4 months ago
- Cloud Security Operations Orchestrator☆186Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- All-in-one tool for managing vulnerability reports from AppSec pipelines☆105Updated 2 years ago
- A Cloud Security Posture Manager or CSPM with a focus on security analysis for the modern cloud stack and a focus on the emerging threat …☆189Updated 11 months ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆126Updated last year
- A Docker container for remote penetration testing.☆138Updated 4 years ago
- A Docker Image For the Open Vulnerability Assessment Scanner (OpenVAS)☆20Updated last year
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Updated last year