redhat-cip / restfuzzLinks
REST API test utility
☆22Updated 6 years ago
Alternatives and similar repositories for restfuzz
Users that are interested in restfuzz are comparing it to the libraries listed below
Sorting:
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- A collection of Ansible roles for automating infosec builds.☆92Updated 7 years ago
- AWS EC2 and S3 Security Auditing Tool☆41Updated 11 years ago
- YAPDNS☆39Updated 10 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Minion☆355Updated 6 years ago
- Automatic firewall rule orchestator.☆83Updated 8 years ago
- ☆78Updated 10 years ago
- Hakabana monitoring tool using Haka, ElastcSearch and Kibana☆20Updated 11 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- sleepy puppy docker setup☆45Updated 7 years ago
- Recon system hardening scanner☆47Updated 9 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Updated 9 years ago
- SSH brute forcer tool and library, using AsyncIO of Python 3.4☆36Updated 5 years ago
- Ansible playbook to install Malware Information Sharing Platform (MISP)☆17Updated 10 years ago
- dnshjmon is a free tool to monitor public DNS records and report hijacks☆91Updated 11 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- A Burp Suite extension that starts scanning on requests it sees, and dumps results on standard output☆21Updated 9 years ago
- A Docker container for Cowrie - SSH honeypot based on kippo☆11Updated 10 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- ☆14Updated 8 years ago
- A tool for discovering subdomains via third party services and wordlists.☆75Updated 9 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Simple (web-) application vulnerability management system☆21Updated 11 years ago
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆44Updated 11 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- A Network Inspection Tool☆82Updated 8 years ago