vmware-labs / attack-surface-frameworkLinks
Tool to discover external and internal network attack surface
☆198Updated last year
Alternatives and similar repositories for attack-surface-framework
Users that are interested in attack-surface-framework are comparing it to the libraries listed below
Sorting:
- SECMON is a web-based tool for the automation of infosec watching and vulnerability management with a web interface.☆221Updated 3 years ago
- Pathfinder is a plugin for mapping network vulnerabilities, scanned by CALDERA or imported by a supported network scanner, and translatin…☆126Updated last month
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆164Updated last week
- Collection of created MindMaps☆150Updated last year
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- Parse .nessus file(s) and shows output in interactive UI☆152Updated last month
- A Python package is used to execute Atomic Red Team tests (Atomics) across multiple operating system environments.☆138Updated 10 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆105Updated 3 years ago
- ☆137Updated 2 years ago
- Active Directory Lab for Penetration Testing☆51Updated 4 years ago
- Shodan Monitoring integration for TheHive.☆130Updated 5 months ago
- Repository resource for threat hunter☆158Updated 6 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆142Updated 2 years ago
- ☆174Updated 2 years ago
- Implementation of RITA (Real Intelligence Threat Analytics) in Jupyter Notebook with improved scoring algorithm.☆202Updated 2 years ago
- A Docker container for remote penetration testing.☆135Updated 4 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆158Updated last year
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆168Updated 7 months ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆151Updated 2 years ago
- Some Threat Hunting queries useful for blue teamers☆127Updated 3 years ago
- Zuthaka is an open source application designed to assist red-teaming efforts, by simplifying the task of managing different APTs and othe…☆177Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- Collaborative pentest tool with highly customizable tools☆74Updated 3 years ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆219Updated 3 years ago
- ☆43Updated 2 years ago
- an excel-centric approach for the MITRE ATT&CK® Tactics and Techniques☆185Updated 3 years ago
- This is the One Stop place where you can several Detection Rules which can help you to kick start your journey on SIEM, SOC work.☆38Updated 3 years ago