All Projects → intrigueio → Intrigue Core

intrigueio / Intrigue Core

Licence: bsd-3-clause
Discover Your Attack Surface!

Programming Languages

ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to Intrigue Core

AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-95.56%)
Mutual labels:  osint, penetration-testing, vulnerability-scanners, reconnaissance
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (-23.49%)
Mutual labels:  penetration-testing, reconnaissance, vulnerability-scanners, security-scanner
Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (-37.51%)
Mutual labels:  penetration-testing, vulnerability-scanners, security-scanner
Ashok
Ashok is a OSINT Recon Tool , a.k.a 😍 Swiss Army knife .
Stars: ✭ 109 (-89.24%)
Mutual labels:  osint, penetration-testing, reconnaissance
warf
WARF is a Web Application Reconnaissance Framework that helps to gather information about the target.
Stars: ✭ 53 (-94.77%)
Mutual labels:  osint, penetration-testing, reconnaissance
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+239.49%)
Mutual labels:  osint, reconnaissance, penetration-testing
Awesome-CyberSec-Resources
An awesome collection of curated Cyber Security resources(Books, Tutorials, Blogs, Podcasts, ...)
Stars: ✭ 273 (-73.05%)
Mutual labels:  osint, penetration-testing, reconnaissance
Vulscan
Advanced vulnerability scanning with Nmap NSE
Stars: ✭ 2,305 (+127.54%)
Mutual labels:  penetration-testing, vulnerability-scanners, security-scanner
bing-ip2hosts
bingip2hosts is a Bing.com web scraper that discovers websites by IP address
Stars: ✭ 99 (-90.23%)
Mutual labels:  osint, discovery, reconnaissance
Gitgot
Semi-automated, feedback-driven tool to rapidly search through troves of public data on GitHub for sensitive secrets.
Stars: ✭ 964 (-4.84%)
Mutual labels:  osint, reconnaissance, security-scanner
Sn0int
Semi-automatic OSINT framework and package manager
Stars: ✭ 814 (-19.64%)
Mutual labels:  osint, reconnaissance, security-scanner
Discover
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
Stars: ✭ 2,548 (+151.53%)
Mutual labels:  osint, penetration-testing, reconnaissance
Raccoon
A high performance offensive security tool for reconnaissance and vulnerability scanning
Stars: ✭ 2,312 (+128.23%)
Mutual labels:  osint, reconnaissance, security-scanner
Theharvester
E-mails, subdomains and names Harvester - OSINT
Stars: ✭ 6,175 (+509.58%)
Mutual labels:  osint, discovery, reconnaissance
Asnip
ASN target organization IP range attack surface mapping for reconnaissance, fast and lightweight
Stars: ✭ 126 (-87.56%)
Mutual labels:  osint, discovery, reconnaissance
Osmedeus
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Stars: ✭ 3,391 (+234.75%)
Mutual labels:  osint, penetration-testing, reconnaissance
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (-83.51%)
Mutual labels:  osint, penetration-testing, reconnaissance
aquatone
A Tool for Domain Flyovers
Stars: ✭ 43 (-95.76%)
Mutual labels:  osint, penetration-testing, reconnaissance
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (-57.85%)
Mutual labels:  osint, penetration-testing, reconnaissance
Scanners Box
A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑
Stars: ✭ 5,590 (+451.83%)
Mutual labels:  vulnerability-scanners, penetration-testing

Welcome!

Intrigue Core is a framework for discovering attack surface. It discovers security-relevant assets and exposures within the context of projects and can be used with a human-in-the-loop running individual tasks, and/or automated through the use of workflows. With a flexible entity model and an incredibly deep enrichment system, it is the most full-featured attack surface discovery framework of its kind.

If you'd like assistance getting started or have development-related questions, feel free to join us in our Intrigue Community slack channel. For all other questions, you can simply drop an email to hello-at-intrigue.io

Getting Started... for Users

To get started quickly and play around with an instance of Core, head on over to the Getting Started Guide. We suggest the Docker image as a first place to start. It's actively built on the main branch of Intrigue Core. An image build on our unstable branch (develop) is also available if you're interested in testing the latest and greatest.

Getting Started... for Developers

To get started setting up a development environment, follow the instructions below:

While you can build a local setup on any OSX or *nix system, we'd suggest starting with our Vagrant setup guide: http://core.intrigue.io/getting-started-with-intrigue-core-on-vagrant-virtualbox/

You'll want to take a look at the following resources to better understand the system:

Getting Support

To get help in real time, join our Intrigue Community slack, where you'll be able to interact directly with the develpment team. Please post a brief 1-2 line introduction in #general when you arrive.

  • For immediate (user) help, join the #core-help channel
  • For immediate (dev) help, join the #core-dev channel

Key Contributors

Intrigue Core would not be possible without the generous time and work from our contributors and maintainers:

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].