aatlasis / PholusLinks
A multicast DNS and DNS Service Discovery Security Assessment Tool
☆73Updated last year
Alternatives and similar repositories for Pholus
Users that are interested in Pholus are comparing it to the libraries listed below
Sorting:
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Extract credentials and other useful info from network captures☆73Updated 2 years ago
- SMBScan is a tool to enumerate file shares on an internal network.☆46Updated 2 weeks ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- A tool to Terraform and automate password cracking on AWS.☆85Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 10 months ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆43Updated 2 years ago
- ☆83Updated 2 years ago
- A simple scanner for identifying vulnerable cups-browsed instances on your network☆62Updated 11 months ago
- PacketSifter is a tool/script that is designed to aid analysts in sifting through a packet capture (pcap) to find noteworthy traffic. Pac…☆95Updated 4 years ago
- A VS Code extension to preview XML nmap output☆44Updated 7 months ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆23Updated 5 months ago
- Tunneling and Port Forwarding Cheat Sheet☆158Updated 2 years ago
- ☆80Updated 2 years ago
- A WLAN red team framework.☆156Updated last year
- nmap scripts (nse files) to identify vulnerabilities☆30Updated 3 weeks ago
- Simple DNS logging server☆18Updated 3 years ago
- ☆34Updated 9 months ago
- A Passive SSH back-end and scanner.☆104Updated 3 months ago
- POSIX script for mail security checks of domain names☆76Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- Various scripts and codes☆85Updated 4 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆107Updated 6 years ago
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆34Updated 2 months ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆173Updated 5 months ago
- Faraday's Command Line Interface☆51Updated last month