Stars
Infection Monkey - An open-source adversary emulation platform
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Investigate malicious Windows logon by visualizing and analyzing Windows event log
A Static Analysis Tool for Detecting Security Vulnerabilities in Python Web Applications
The most complete open-source tool for Twitter intelligence analysis
Analyze the security of any domain by finding all the information possible. Made in python.
Uses Empire's (https://github.com/BC-SECURITY/Empire) RESTful API to automate gaining Domain and/or Enterprise Admin rights in Active Directory environments using some of the most common offensive …
Create actionable data from your Vulnerability Scans
Source code for the book "Violent Python" by TJ O'Connor. The code has been fully converted to Python 3, reformatted to comply with PEP8 standards and refactored to eliminate dependency issues invo…
Red Team K8S Adversary Emulation Based on kubectl
Lookyloo is a web interface that allows users to capture a website page and then display a tree of domains that call each other.
Machinae Security Intelligence Collector
Red team Arsenal - An intelligent scanner to detect security vulnerabilities in company's layer 7 assets.
Collecting & Hunting for IOCs with gusto and style
CryptoNice is both a command line tool and library which provides the ability to scan and report on the configuration of SSL/TLS for your internet or internal facing web services. Built using the s…
Automated detection rule analysis utility
An app that checks the permissions of Google Drive documents against a config file.