purpleteam-labs / purpleteam-app-scanner
Application scanning component of OWASP PurpleTeam
☆15Updated 2 years ago
Alternatives and similar repositories for purpleteam-app-scanner
Users that are interested in purpleteam-app-scanner are comparing it to the libraries listed below
Sorting:
- Training scenarios for cyber ranges☆11Updated 5 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Updated last month
- Takes in scan reports from the GVM PostgreSQL Database and dump into Elasticsearch☆14Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 8 years ago
- ☆15Updated 3 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- Generic Signature Format for SIEM Systems☆14Updated 3 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated 2 years ago
- ☆21Updated 2 years ago
- ☆11Updated 8 years ago
- cool dockerfiles☆13Updated 8 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated 5 months ago
- The FastIR Server is a Web server to schedule FastIR Collector forensics collect thanks to the FastIR Agent☆12Updated 8 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- SwaraVM is a mobile security virtual machine that aggregates tools and resources that are commonly used for network traffic analysis, mal…☆29Updated 5 years ago
- Fast and passive subdomain enumeration.☆17Updated 3 years ago
- Exploit for win10 SMB3.1☆17Updated 5 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- TLS scanning component of OWASP PurpleTeam☆11Updated 2 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆17Updated last year
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆19Updated last year
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Simplified NAT Slipstream server and client☆21Updated 4 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago