tatanus / apt2Links
APT2 is a pentest automation framework that can be used to assist pentesters, blue team members, and others in identifying easily exploitable issues and common attack paths.
☆68Updated 7 years ago
Alternatives and similar repositories for apt2
Users that are interested in apt2 are comparing it to the libraries listed below
Sorting:
- Collaborative pentest tool with highly customizable tools☆73Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 4 years ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- OSINT tool for discovering confidential data leaked on Github.☆51Updated 2 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- Automate Metasploit scanning and exploitation☆117Updated 6 months ago
- Tool to find SMTP servers vulnerable to open relay☆83Updated 5 years ago
- Offensive Security recon tool☆91Updated 4 years ago
- Nmap Web Dashboard and Reporting☆34Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- An advanced graphical search engine for Exploit-DB☆120Updated last year
- automated password spraying tool☆148Updated 4 years ago
- Various scripts and codes☆84Updated 4 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- ☆33Updated last year
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- ☆25Updated 5 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆99Updated 4 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆58Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Automated Penetration Testing Framework☆35Updated 6 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆135Updated 3 weeks ago
- Web Recon & Exploitation Tool.☆54Updated 5 years ago