trimstray / otsecaLinks
Open source security auditing tool to search and dump system configuration. It allows you to generate reports in HTML or RAW-HTML formats.
☆493Updated 7 months ago
Alternatives and similar repositories for otseca
Users that are interested in otseca are comparing it to the libraries listed below
Sorting:
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆420Updated 6 years ago
- Easy automated vulnerability scanning, reporting and analysis☆701Updated 5 years ago
- My personal hacklab, create your own.☆336Updated 2 years ago
- A UNIX security auditing tool based on several security frameworks☆316Updated last month
- Blue Team Scripts☆250Updated 6 years ago
- Network reconnaissance and vulnerability assessment tools.☆402Updated 3 years ago
- Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.☆736Updated last year
- Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.☆414Updated last year
- network reconnaissance toolkit☆424Updated 6 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆381Updated 7 years ago
- Ultimate Network Stealther that makes Linux a Ghost In The Net and protects from MITM/DOS/scan☆373Updated 2 years ago
- Minimal docker container of Parrot OS for running an automated scan & pentest report.☆194Updated 2 years ago
- Easy-to-use live forensics toolbox for Linux endpoints☆408Updated last year
- Penetration Testing tools - one repo to clone them all... containing latest pen testing tools☆533Updated 5 years ago
- Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of rel…☆419Updated last month
- A collection of security related Python and Bash shell scripts. Analyze hosts on generic security vulnerabilities. Wrapper around popular…☆274Updated last year
- ☆607Updated 9 months ago
- Open source tool to help you build a valid SSL certificate chain.☆369Updated 7 months ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Updated 2 years ago
- Burp-Automator: A Burp Suite Automation Tool with Slack Integration. It can be used with Jenkins and Selenium to automate Dynamic Applica…☆480Updated 6 years ago
- Red Team Tactics, Techniques, and Procedures☆405Updated last month
- Various Tools and Docker Images☆280Updated 2 months ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆263Updated 7 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆250Updated 5 years ago
- A powerful target reconnaissance framework powered by graph theory.☆420Updated 2 years ago
- DNS Recon | Brute Forcer | DNS Zone Transfer | DNS Wild Card Checks | DNS Wild Card Brute Forcer | Email Enumeration | Staff Enumeration …☆636Updated 2 years ago
- Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors…☆1,213Updated 6 years ago
- Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles.☆1,673Updated 7 months ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Updated 3 years ago
- Correlate data between domains, IPs and email addresses, present it as a graph and store everything into Elasticsearch and JSON files.☆681Updated 5 years ago