vmware-labs / attack-surface-framework
Tool to discover external and internal network attack surface
☆195Updated 9 months ago
Alternatives and similar repositories for attack-surface-framework:
Users that are interested in attack-surface-framework are comparing it to the libraries listed below
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated 10 months ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆176Updated 2 years ago
- ☆169Updated last year
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 2 years ago
- ☆133Updated last year
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆106Updated 2 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆162Updated this week
- Blue Team detection lab created with Terraform and Ansible in Azure.☆147Updated 3 months ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆200Updated 2 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆149Updated last year
- Top ATT&CK Techniques helps defenders approach the breadth and complexity of MITRE ATT&CK® with a prioritized top 10 list of techniques t…☆117Updated this week
- Shodan Monitoring integration for TheHive.☆130Updated 3 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆286Updated 2 years ago
- Active Directory Lab for Penetration Testing☆50Updated 4 years ago
- Vulnerability scanner for AWS customer managed policies using ChatGPT☆143Updated last year
- Parse .nessus file(s) and shows output in interactive UI☆149Updated 10 months ago
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆137Updated 7 months ago
- Open Threat Hunting Framework☆112Updated last year
- Collection of created MindMaps☆150Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆283Updated 10 months ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆59Updated 2 years ago
- ☆41Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- A Docker container for remote penetration testing.☆134Updated 3 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆140Updated last month
- An open-source self-hosted purple team management web application.☆260Updated this week
- HoneyCreds network credential injection to detect responder and other network poisoners.☆216Updated 3 years ago
- A Cobalt Strike Scanner that retrieves detected Team Server beacons into a JSON object☆165Updated 2 years ago
- Data visualization for blue teams☆125Updated 2 years ago