All Projects → Bulwark → Similar Projects or Alternatives

1630 Open source projects that are alternatives of or similar to Bulwark

Wstg
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Stars: ✭ 3,873 (+3327.43%)
JWTweak
Detects the algorithm of input JWT Token and provide options to generate the new JWT token based on the user selected algorithm.
Stars: ✭ 85 (-24.78%)
Watchdog
Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.
Stars: ✭ 345 (+205.31%)
Purify
All-in-one tool for managing vulnerability reports from AppSec pipelines
Stars: ✭ 72 (-36.28%)
Whatweb
Next generation web scanner
Stars: ✭ 3,503 (+3000%)
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+585.84%)
Mutual labels:  security-tools, pentesting, red-team
Archerysec
Centralize Vulnerability Assessment and Management for DevSecOps Team
Stars: ✭ 1,802 (+1494.69%)
Rengine
reNgine is an automated reconnaissance framework for web applications with a focus on highly configurable streamlined recon process via Engines, recon data correlation and organization, continuous monitoring, backed by a database, and simple yet intuitive User Interface. reNgine makes it easy for penetration testers to gather reconnaissance with…
Stars: ✭ 3,439 (+2943.36%)
Mutual labels:  security-tools, pentesting, bugbounty
Rescope
Rescope is a tool geared towards pentesters and bugbounty researchers, that aims to make life easier when defining scopes for Burp Suite and OWASP ZAP.
Stars: ✭ 156 (+38.05%)
Mutual labels:  security-tools, pentesting, bugbounty
Rfi Lfi Payload List
🎯 RFI/LFI Payload List
Stars: ✭ 202 (+78.76%)
Hosthunter
HostHunter a recon tool for discovering hostnames using OSINT techniques.
Stars: ✭ 427 (+277.88%)
Mutual labels:  security-tools, pentesting, bugbounty
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+6312.39%)
Mutual labels:  pentesting, appsec, bugbounty
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+1525.66%)
Mutual labels:  security-tools, pentesting, bugbounty
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+585.84%)
Knary
A simple HTTP(S) and DNS Canary bot with Slack/Discord/MS Teams & Pushover support
Stars: ✭ 187 (+65.49%)
Mutual labels:  security-tools, pentesting, bugbounty
nerdbug
Full Nuclei automation script with logic explanation.
Stars: ✭ 153 (+35.4%)
Resources
A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-45.13%)
Mutual labels:  security-tools, pentesting, bugbounty
Vuls
Agent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+7726.55%)
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+5448.67%)
Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (+905.31%)
Mutual labels:  security-tools, pentesting, red-team
Swiftness
A note-taking macOS app for penetration-testers.
Stars: ✭ 124 (+9.73%)
Crithit
Takes a single wordlist item and tests it one by one over a large collection of websites before moving onto the next. Create signatures to cross-check vulnerabilities over multiple hosts.
Stars: ✭ 182 (+61.06%)
Mutual labels:  security-tools, pentesting, bugbounty
Airmaster
Use ExpiredDomains.net and BlueCoat to find useful domains for red team.
Stars: ✭ 150 (+32.74%)
Mutual labels:  security-tools, pentesting, red-team
Aiodnsbrute
Python 3.5+ DNS asynchronous brute force utility
Stars: ✭ 370 (+227.43%)
Mutual labels:  security-tools, pentesting, red-team
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (+258.41%)
Mutual labels:  security-tools, pentesting, red-team
Bigbountyrecon
BigBountyRecon tool utilises 58 different techniques using various Google dorks and open source tools to expedite the process of initial reconnaissance on the target organisation.
Stars: ✭ 541 (+378.76%)
Mutual labels:  pentesting, red-team, bugbounty
awesome-list-of-secrets-in-environment-variables
🦄🔒 Awesome list of secrets in environment variables 🖥️
Stars: ✭ 538 (+376.11%)
Mutual labels:  pentesting, bugbounty, red-team
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (+350.44%)
Mutual labels:  security-tools, pentesting, bugbounty
Jackhammer
Jackhammer - One Security vulnerability assessment/management tool to solve all the security team problems.
Stars: ✭ 633 (+460.18%)
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+541.59%)
Mutual labels:  security-tools, pentesting
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+544.25%)
Mutual labels:  security-tools, pentesting
Bypass Firewalls By Dns History
Firewall bypass script based on DNS history records. This script will search for DNS A history records and check if the server replies for that domain. Handy for bugbounty hunters.
Stars: ✭ 739 (+553.98%)
Mutual labels:  security-tools, bugbounty
Interlace
Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.
Stars: ✭ 760 (+572.57%)
Mutual labels:  security-tools, bugbounty
Stacoan
StaCoAn is a crossplatform tool which aids developers, bugbounty hunters and ethical hackers performing static code analysis on mobile applications.
Stars: ✭ 707 (+525.66%)
Mutual labels:  security-tools, bugbounty
Breaking And Pwning Apps And Servers Aws Azure Training
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Stars: ✭ 749 (+562.83%)
Mutual labels:  pentesting, application-security
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-7.08%)
Mutual labels:  security-tools, pentesting
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+576.11%)
Mutual labels:  security-tools, pentesting
Ossa
Open-Source Security Architecture | 开源安全架构
Stars: ✭ 796 (+604.42%)
Autordpwn
The Shadow Attack Framework
Stars: ✭ 688 (+508.85%)
Mutual labels:  pentesting, red-team
Vhostscan
A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, aliases and dynamic default pages.
Stars: ✭ 767 (+578.76%)
Mutual labels:  security-tools, bugbounty
Privesc
A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.
Stars: ✭ 786 (+595.58%)
Mutual labels:  pentesting, bugbounty
Embedos
EmbedOS - Embedded security testing virtual machine
Stars: ✭ 108 (-4.42%)
Mutual labels:  security-tools, pentesting
Xattacker
X Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+693.81%)
Security
Some of my security stuff and vulnerabilities. Nothing advanced. More to come.
Stars: ✭ 835 (+638.94%)
Mutual labels:  pentesting, appsec
Subdomainizer
A tool to find subdomains and interesting things hidden inside, external Javascript files of page, folder, and Github.
Stars: ✭ 915 (+709.73%)
Mutual labels:  security-tools, bugbounty
Go Deliver
Go-deliver is a payload delivery tool coded in Go.
Stars: ✭ 103 (-8.85%)
Mutual labels:  pentesting, red-team
Sessiongopher
SessionGopher is a PowerShell tool that uses WMI to extract saved session information for remote access tools such as WinSCP, PuTTY, SuperPuTTY, FileZilla, and Microsoft Remote Desktop. It can be run remotely or locally.
Stars: ✭ 833 (+637.17%)
Mutual labels:  pentesting, red-team
Sudomy
Sudomy is a subdomain enumeration tool to collect subdomains and analyzing domains performing automated reconnaissance (recon) for bug hunting / pentesting
Stars: ✭ 859 (+660.18%)
Mutual labels:  pentesting, bugbounty
Gogitdumper
Dump exposed HTTP .git fast
Stars: ✭ 27 (-76.11%)
Mutual labels:  pentesting, bugbounty
Dirhunt
Find web directories without bruteforce
Stars: ✭ 983 (+769.91%)
Mutual labels:  security-tools, pentesting
Social Analyzer
API, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites (Detections are updated regularly by automated systems)
Stars: ✭ 8,449 (+7376.99%)
Mutual labels:  pentesting, security-tools
Vulnx
vulnx 🕷️ is an intelligent bot auto shell injector that detect vulnerabilities in multiple types of cms { `wordpress , joomla , drupal , prestashop .. `}
Stars: ✭ 1,009 (+792.92%)
Vailyn
A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python
Stars: ✭ 103 (-8.85%)
Sprayingtoolkit
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+609.73%)
Mutual labels:  security-tools, pentesting
Ksubdomain
无状态子域名爆破工具
Stars: ✭ 976 (+763.72%)
Mutual labels:  security-tools, pentesting
Sleight
Empire HTTP(S) C2 redirector setup script
Stars: ✭ 44 (-61.06%)
Mutual labels:  pentesting, red-team
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+7847.79%)
Mutual labels:  pentesting, bugbounty
Vulmap
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞利用功能
Stars: ✭ 1,079 (+854.87%)
Mutual labels:  security-tools, pentesting
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+849.56%)
Mutual labels:  security-tools, bugbounty
Lynis
Lynis - Security auditing tool for Linux, macOS, and UNIX-based systems. Assists with compliance testing (HIPAA/ISO27001/PCI DSS) and system hardening. Agentless, and installation optional.
Stars: ✭ 9,137 (+7985.84%)
1-60 of 1630 similar projects