Automation for security
☆13Apr 23, 2016Updated 9 years ago
Alternatives and similar repositories for SecAutomationFramework
Users that are interested in SecAutomationFramework are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Summation of the OWASP Testing Guide for reference☆10Jun 19, 2017Updated 8 years ago
- Simple (web-) application vulnerability management system☆21Aug 14, 2014Updated 11 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Automated Cisco SNMP Enumeration, Brute Force, Configuration Download and Password Cracking☆19Aug 19, 2016Updated 9 years ago
- Mathilda is a C++ class for distributing web requests to worker processes☆29Aug 16, 2016Updated 9 years ago
- Forecast is a big data environment for understanding security anomalies as they are presented in a project and is meant to aid in the col…☆15Jun 17, 2016Updated 9 years ago
- The script will be used to collect general os logs as well as Docker and ecs-agent logs, it also support to enable debug mode for docker …☆15Aug 27, 2025Updated 6 months ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- ☆14Feb 27, 2018Updated 8 years ago
- Distributed password cracker for operating over high latency networks of loosely coupled hosts.☆13Jul 30, 2013Updated 12 years ago
- AWS, Ansible, and CodeDeploy demo - Deployment Repo☆13Nov 4, 2016Updated 9 years ago
- A barebone vim plugin to fetch user assigned cards from Trello☆17Aug 29, 2023Updated 2 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Python module to parse AWS XML usage files☆25Feb 3, 2011Updated 15 years ago
- Tachikoma is a security alerting framework for human beings☆22Sep 7, 2018Updated 7 years ago
- A simple go app with vagrant for testing, packer for building and a cloudformation template for deployment☆18Oct 8, 2016Updated 9 years ago
- Consider it goformation for the serverless project☆20Nov 15, 2023Updated 2 years ago
- A demo project that implements HashiCorp Vault on Google Clould Platform / CoreOS cluster, managed by Terraform☆25Jun 29, 2016Updated 9 years ago
- Testing infrastructure and frameworks for ACK☆24Updated this week
- ☆15Nov 29, 2022Updated 3 years ago
- ☆15Dec 4, 2018Updated 7 years ago
- An application to assist in the organization and prioritization of software security activities.☆139Jun 10, 2021Updated 4 years ago
- Vagrantfile for ops-class.org machine setup.☆20Feb 9, 2017Updated 9 years ago
- This is plugin to SSH into Worker Nodes running on AWS☆17May 16, 2021Updated 4 years ago
- A tool to check your Atlassian Connect app against Atlassian's security requirements.☆16Jan 27, 2026Updated last month
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- ☆18Nov 6, 2016Updated 9 years ago
- Powerful, yet simple to use, shell command output colorizer in Python☆21Dec 5, 2022Updated 3 years ago
- ☆53Sep 16, 2021Updated 4 years ago
- A page escalation system using AWS Lambda, Step Functions, and API Gateway.☆26May 12, 2018Updated 7 years ago
- These are my study notes, written in Markdown☆13Oct 12, 2020Updated 5 years ago
- Bridje Java Framework☆14Dec 12, 2022Updated 3 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Nov 17, 2018Updated 7 years ago
- Ready to use images of Zap and Glue, especially for CI integration.☆35Mar 12, 2019Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆26Dec 12, 2018Updated 7 years ago
- swiss army knife of ISM RF!☆24Aug 3, 2017Updated 8 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Sep 2, 2015Updated 10 years ago