Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support
☆115Feb 5, 2026Updated last month
Alternatives and similar repositories for pqcscan
Users that are interested in pqcscan are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ZAPISEC WAF-Copilot is an automated AI-powered security framework for web applications with a focus on highly configurable streamlined vu…☆21Oct 6, 2025Updated 5 months ago
- An AI-powered assistant for hackers and security professionals built for Caido☆31Jan 24, 2026Updated 2 months ago
- Nakamoto is a 2 layer encryption tool to protect your data and your cyptocurrency☆15Nov 13, 2025Updated 4 months ago
- vBrowser is a secure, containerized browser platform designed for covert web investigations. Originally created to support deep and dark …☆20Feb 24, 2026Updated last month
- Detect drift. Defend cloud.☆36Feb 21, 2026Updated last month
- An OpenAI API Compatible Honeypot Gateway☆17Mar 17, 2025Updated last year
- Analyzes software dependencies across GitHub repositories to identify security vulnerabilities and health risks in your supply chain.☆121Dec 9, 2025Updated 3 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆57May 17, 2025Updated 10 months ago
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆42Feb 8, 2026Updated last month
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆96Apr 2, 2025Updated 11 months ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- ☆15Aug 25, 2023Updated 2 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆42Sep 16, 2025Updated 6 months ago
- Crashbench is a LLM benchmark to measure bug-finding and reporting capabilities of LLMs☆14Mar 8, 2026Updated 2 weeks ago
- A Kubernetes Forensic Collection Framework for Azure Kubernetes Service☆41Feb 9, 2026Updated last month
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated 11 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆50Mar 10, 2025Updated last year
- Script to enabled DNS Debug Logging across Domain Controllers in a Forest and then retrieve for analysis☆14May 27, 2016Updated 9 years ago
- Micro-agent framework for Caido☆29Sep 4, 2025Updated 6 months ago
- ☆46Nov 7, 2024Updated last year
- TTPMapper is an AI-driven threat intelligence parser that converts unstructured reports whether from web URLs or PDF files into structure…☆51Jun 21, 2025Updated 9 months ago
- A tool to interact with Windows drivers to perform a raw disk read and parse out target files without calling standard Windows file APIs☆107Sep 4, 2025Updated 6 months ago
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆15Jan 25, 2026Updated 2 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆13Feb 19, 2025Updated last year
- Automated vulnerability discovery and annotation☆68Jul 26, 2024Updated last year
- Security tool against dependency typosquatting attacks☆55Mar 17, 2026Updated last week
- Cypherpunks Hall of Fame☆23Nov 10, 2025Updated 4 months ago
- ☆11Dec 19, 2024Updated last year
- Easily generate reproducible infrastructure☆40Dec 3, 2025Updated 3 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆142Jan 2, 2025Updated last year
- Data about all known supply-chain attacks through history☆64May 28, 2025Updated 9 months ago
- SVG Analysis and generation tools for commonly seen SVG attachment phishing☆55Sep 24, 2025Updated 6 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- A mail reflector written in Python with modules for SPF, DKIM and DMARC authentication, used as a test system for testing correspondent's…☆13Sep 15, 2016Updated 9 years ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Sep 30, 2024Updated last year
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆149Nov 14, 2025Updated 4 months ago
- ☆23Mar 2, 2026Updated 3 weeks ago