trimstray / otseca
Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
☆491Updated 4 months ago
Alternatives and similar repositories for otseca:
Users that are interested in otseca are comparing it to the libraries listed below
- A UNIX security auditing tool based on several security frameworks☆314Updated 8 months ago
- Easy automated vulnerability scanning, reporting and analysis☆702Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Updated 7 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆416Updated 6 years ago
- Open source tool to help you build a valid SSL certificate chain.☆364Updated 4 months ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆481Updated 6 years ago
- Minimal docker container of Parrot OS for running an automated scan & pentest report.☆193Updated last year
- Blue Team Scripts☆247Updated 5 years ago
- Various Tools and Docker Images☆279Updated 6 years ago
- MassBleed SSL Vulnerability Scanner☆241Updated 4 years ago
- A testing framework for mail security and filtering solutions.☆244Updated last year
- This script communicates with the Nessus API in an attempt to help with automating scans. Depending on the flag issued with the script, y…☆215Updated 5 years ago
- Offensive tools as Dockerfiles. Lightweight & Ready to go☆205Updated 6 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆370Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆248Updated 5 years ago
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆122Updated 7 years ago
- Red Team Tactics, Techniques, and Procedures☆398Updated last month
- a CLI for ephemeral penetration testing☆12Updated 5 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆405Updated last year
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆210Updated 3 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆418Updated 7 months ago
- an asynchronous target enumeration tool☆243Updated 2 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆729Updated last year
- network reconnaissance toolkit☆423Updated 6 years ago
- Mercure is a tool for security managers who want to train their colleague to phishing.☆268Updated 4 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- Powershell-based Windows Security Auditing Toolbox☆576Updated 6 years ago
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆412Updated last year