当前位置:网站首页>Enterprise security attack surface analysis tool
Enterprise security attack surface analysis tool
2022-06-24 16:07:00 【Bypass】
Examine the possible vulnerabilities of enterprise Internet assets or other possibilities that can be attacked from the perspective of attackers , This is an extremely important work . Today, I'd like to share some open source enterprise attack surface analysis tools , It can help Party A's security team sort out and detect the attack surface .
01、Goby - Attack surface mapping
Goby It is a new generation of network security assessment tools , It can sort out the most complete attack information for enterprises , At the same time, it can quickly penetrate into the enterprise intranet according to the vulnerabilities exposed in the external network .
Official website address :
https://gobies.org/
02、ARL - Asset safety Lighthouse
Quickly discover and sort out enterprise extranet assets , Build asset information base , Assist Party A's security team or penetration testers to quickly find the weak points and attack areas in the enterprise's assets .
github Project address :
https://github.com/TophantTechnology/ARL
03、linglong - Asset cruise scanning system
System positioning is through masscan+nmap Infinite cycle to find new assets , Automatically conduct port weak password blasting 、 fingerprint identification 、XrayPoc scanning .
github Project address :
https://github.com/awake1t/linglong
04、SEC- Distributed asset security scanning
SEC It can be used for enterprises to scan and troubleshoot the security of server resources , Controllable 、 You can stop running scanning tasks 、 Support distributed multi node deployment , Faster scanning progress + Nodes perform information dynamic feedback , Quickly locate vulnerabilities .
github Project address :
https://github.com/smallcham/sec-admin
05、w12scan - Network security asset scanning engine
adopt WEB Interface issue task ,w12scan Relevant assets will be automatically aggregated to facilitate analysis and use .
github Project address :
https://github.com/w-digital-scanner/w12scan
边栏推荐
- Recommend several super practical data analysis tools
- Fastjson 漏洞利用技巧
- Istio FAQ: failed to resolve after enabling smart DNS
- How does the effective date of SAP PP ECM affect the work order?
- Mysql之Binlog
- 不忘初心
- 转置卷积学习笔记
- [log service CLS] Tencent cloud log4j/logback log collection best practices
- Learning these 10 kinds of timed tasks, I'm a little floating
- 【面试高频题】难度 3/5,可直接构造的序列 DP 题
猜你喜欢

C. Three displays(动态规划)Codeforces Round #485 (Div. 2)

Linux record -4.22 MySQL 5.37 installation (supplementary)

几种常见的DoS攻击

I just came back from the Ali software test. I worked for Alibaba P7 in 3+1, with an annual salary of 28*15

Several common DoS attacks
![clang: warning: argument unused during compilation: ‘-no-pie‘ [-Wunused-command-line-argument]](/img/f0/42f394dbc989d381387c7b953d2a39.jpg)
clang: warning: argument unused during compilation: ‘-no-pie‘ [-Wunused-command-line-argument]

使用阿里云RDS for SQL Server性能洞察优化数据库负载-初识性能洞察

Why is it easy for enterprises to fail in implementing WMS warehouse management system

【面试高频题】难度 3/5,可直接构造的序列 DP 题

CAP:多重注意力机制,有趣的细粒度分类方案 | AAAI 2021
随机推荐
Linux record -4.22 MySQL 5.37 installation (supplementary)
#夏日挑战赛# HarmonyOS - 实现带日期效果的待办事项
2021-05-03: given a non negative integer num, how to avoid circular statements,
Detailed explanation of estab of Stata regression table output
存在安全隐患 路虎召回部分混动揽运
2021-04-24: handwriting Code: topology sorting.
Learning these 10 kinds of timed tasks, I'm a little floating
Why is it easy for enterprises to fail in implementing WMS warehouse management system
Easy installation of Jenkins
中国产品经理的没落:从怀恋乔布斯开始谈起
Flink Kubernetes Application部署
Global and Chinese market of music synthesizer 2022-2028: Research Report on technology, participants, trends, market size and share
Vim编辑器的最常用的用法
A new weapon to break the memory wall has become a "hot search" in the industry! Persistent memory enables workers to play with massive data + high-dimensional models
企业安全攻击面分析工具
MongoDB入門實戰教程:學習總結目錄
Efficient tools commonly used by individuals
【Prometheus】4. Monitoring cases
Nifi from introduction to practice (nanny level tutorial) - environment
找出隐形资产--利用Hosts碰撞突破边界