aatlasis / PholusLinks
A multicast DNS and DNS Service Discovery Security Assessment Tool
☆71Updated last year
Alternatives and similar repositories for Pholus
Users that are interested in Pholus are comparing it to the libraries listed below
Sorting:
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆70Updated last year
- Extract credentials and other useful info from network captures☆70Updated 2 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆45Updated 3 weeks ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- IVRE's fork of the famous TCP port scanner. See below for details.☆40Updated 5 months ago
- A tool to Terraform and automate password cracking on AWS.☆84Updated 5 years ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- POSIX script for mail security checks of domain names☆75Updated last year
- A VS Code extension to preview XML nmap output☆44Updated 4 months ago
- Tool to identify routers on the local LAN and paths to the Internet☆65Updated last year
- quicmap is a simple yet quic (!) QUIC protocol scanner☆87Updated last year
- ☆31Updated 6 months ago
- Merge multiple nMap xml files into one☆50Updated 6 years ago
- brute force SSH public-key authentication☆77Updated last month
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year
- A Passive SSH back-end and scanner.☆102Updated 3 weeks ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆104Updated 6 years ago
- SNIcat☆126Updated 3 years ago
- ☆80Updated 2 years ago
- All kinds of tiny shells☆58Updated 2 years ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆32Updated last year
- Finding sensitive information in the trimmed parts of cropped images☆30Updated 3 years ago
- Commands used in Windows penetration tests☆53Updated 3 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 2 years ago
- Various scripts and codes☆84Updated 4 years ago
- Genshell: The atomatic copy-and-paste oneline reverse shell generator. Just add args!☆67Updated 4 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆149Updated 2 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆33Updated 3 years ago
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆28Updated last year