Lists (9)
Sort Name ascending (A-Z)
Stars
Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes, code repositories, clouds and more
A next-generation crawling and spidering framework.
In-depth attack surface mapping and asset discovery
Monitor linux processes without root permissions
Simple, fast web crawler designed for easy, quick discovery of endpoints and assets within a web application
Take a list of domains and probe for working HTTP and HTTPS servers
βοΈ β‘ Granular, Actionable Adversary Emulation for the Cloud
Small, fast tool for performing reverse DNS lookups en masse.
FalconHound is a blue team multi-tool. It allows you to utilize and enhance the power of BloodHound in a more automated fashion. It is designed to be used in conjunction with a SIEM or other log agβ¦
TokenSmith generates Entra ID access & refresh tokens on offensive engagements. It is suitable for both covert adversary simulations and penetration tests with the tokens generated working out of tβ¦
Establishes persistence on a Linux system by creating a udev rule that triggers the execution of a specified payload (binary or script)