purpleteam-labs / purpleteam-app-scanner
Application scanning component of OWASP PurpleTeam
☆13Updated last year
Related projects: ⓘ
- Create machine images containing the Nessus vulnerability scanner☆10Updated last week
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 3 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- Guidelines for writing secure code for Python developers.☆19Updated 7 years ago
- SSL/TLS vulnerability research☆10Updated 2 years ago
- F-Secure Lightweight Acqusition for Incident Response (FLAIR)☆16Updated 3 years ago
- Deploy an "illegal" SOC to manage vulnerabilities on your city servers in minutes.☆19Updated last year
- Dockerfile with advanced configurations for Offensive Docker.☆11Updated 4 years ago
- ☆15Updated 2 years ago
- Command line tool that allows you to explore IoT devices by using Shodan API.☆24Updated 3 years ago
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆19Updated 2 years ago
- Data exfiltration using DNS☆21Updated 4 years ago
- ☆13Updated 11 months ago
- Reconnaissance test in Kubernetes clusters☆21Updated 5 years ago
- Deploy multiple instances of Nessus in docker containers easily☆19Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆16Updated 3 years ago
- Fast and passive subdomain enumeration.☆14Updated 2 years ago
- MyOpenVDP is a free web application to install a vulnerability disclosure policy or a vulnerability disclosure program on your assets. (V…☆26Updated last month
- A collection of tools adversaries commonly use in an attack.☆14Updated 3 months ago
- Generic Signature Format for SIEM Systems☆14Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆12Updated 2 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Updated 3 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆14Updated 2 years ago
- Yet another powerful payload encoder/decoder☆12Updated 2 years ago
- Source code for the Binaries of OWASP WrongSecrets☆9Updated 2 months ago
- Web application pentesting recon☆23Updated 4 years ago
- Kubernetes Security Testing Guide☆26Updated 4 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated last year
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago