Help developers discover the tools you use. Get visibility for your team's tech choices and contribute to the community's knowledge.
It is a free, open-source penetration testing tool. It is designed specifically for testing web applications and is both flexible and extensible. | An open source security tool for testing a data center's resiliency to perimeter breaches and internal server infection. The Monkey uses various methods to self propagate across a data center and reports success to a centralized Monkey Island server. |
Open source;
Cross platform (it even runs on a Raspberry Pi!);
Easy to install (using a multi-platform installer builder);
Completely free (no paid for 'Pro' version);
Ease of use a priority;
Comprehensive help pages;
Fully internationalized | Multiple propagation techniques,Predefined passwords for SSH, SMB, RDP, WMI, Common logical exploits, Shellhock,Sambacry, Password stealing using Mimikatz and ssh keys;
Automated security report with reccomendations |
Statistics | |
GitHub Stars - | GitHub Stars 6.9K |
GitHub Forks - | GitHub Forks 810 |
Stacks 81 | Stacks 4 |
Followers 45 | Followers 19 |
Votes 0 | Votes 1 |
Pros & Cons | |
No community feedback yet | Pros
|

At its core, Vulseek combines automated asset discovery and scanning with intelligent risk prioritization, allowing security teams to focus on what truly matters. Its customizable dashboards, real-time alerts, and integrations with popular ticketing systems and SIEMs help ensure vulnerabilities are addressed swiftly and systematically.

It is a penetration testing tool empowered by ChatGPT. It is designed to automate the penetration testing process. It is built on top of ChatGPT and operates in an interactive mode to guide penetration testers in both overall progress and specific operations.

It is a compliance-focused pentesting-as-a-service platform. It allows companies to easily schedule and manage penetration tests, designed for both compliance and security enhancement.

It is an open-source Java application for network communication proxying for the purpose of penetration testing. It allows penetration testers to set up proxies and interceptors to manage the traffic transmitted between client and server.