aatlasis / Pholus
A multicast DNS and DNS Service Discovery Security Assessment Tool
☆67Updated 11 months ago
Related projects ⓘ
Alternatives and complementary repositories for Pholus
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆67Updated 9 months ago
- This repo contains a list of vendors that hide their security advisories, alerts, notices, vulnerabilities, and more behind either a payw…☆31Updated 6 months ago
- THC "R U There" network discovery tool☆26Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- SNIcat☆125Updated 3 years ago
- A VS Code extension to preview XML nmap output☆45Updated 9 months ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆31Updated 2 years ago
- A Passive SSH back-end and scanner.☆102Updated 5 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆93Updated 3 years ago
- Source code and examples for Antignis☆36Updated 2 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆40Updated 2 years ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆107Updated 2 years ago
- Finding sensitive information in the trimmed parts of cropped images☆28Updated 2 years ago
- a smart DNS response-guided subdomain fuzzer☆146Updated last year
- quicmap is a simple yet quic (!) QUIC protocol scanner☆81Updated 8 months ago
- SMBScan is a tool to enumerate file shares on an internal network.☆40Updated last month
- Citrix Scanner for CVE-2023-3519☆48Updated last year
- Automatically exported from code.google.com/p/nipper-ng☆66Updated 2 years ago
- ☆79Updated last year
- Short guide on how to achieve BGP spoofing and implement a MiTM attack against SSH☆20Updated 3 years ago
- Merge multiple nMap xml files into one☆49Updated 5 years ago
- ☆25Updated 3 weeks ago
- LDAP Swiss Army Knife☆43Updated 11 months ago
- Nmap and NSE command line wrapper in the style of Metasploit☆39Updated 2 years ago
- Using Microsoft 365 App Passwords for persistence☆23Updated 4 years ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 3 weeks ago
- ☆48Updated 7 months ago