anvilsecure / pqcscanLinks
Post-Quantum Cryptography Scanner - Scan SSH/TLS servers for PQC support
☆89Updated 2 months ago
Alternatives and similar repositories for pqcscan
Users that are interested in pqcscan are comparing it to the libraries listed below
Sorting:
- Unauthenticated enumeration of AWS IAM Roles.☆25Updated 3 weeks ago
- Pentester-focused Docker registry tool to enumerate and pull images☆33Updated 2 months ago
- ☆84Updated 2 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated 6 months ago
- Security tool against dependency typosquatting attacks☆54Updated this week
- ☆97Updated 2 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 7 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆230Updated last month
- PoC shadow SaaS and insecure credential detection system using a browser extension.☆40Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆57Updated 8 months ago
- SecureMCP is a security auditing tool designed to detect vulnerabilities and misconfigurations in applications using the [Model Context P…☆133Updated 3 months ago
- A comprehensive security scanner for Model Context Protocol (MCP) servers that detects vulnerabilities and security issues in your MCP se…☆98Updated 3 weeks ago
- An OpenAI API Compatible Honeypot Gateway☆16Updated 6 months ago
- ☆39Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆91Updated last month
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆102Updated 4 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- Data about all known supply-chain attacks through history☆60Updated 4 months ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆65Updated 2 weeks ago
- Modular web-application honeypot platform built using go and gin☆60Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- Automated vulnerability discovery and annotation☆67Updated last year
- ☆73Updated 3 weeks ago
- Tail Certificate Transparency logs and extract hostnames☆124Updated 3 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 11 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 10 months ago
- Tool for obfuscating and deobfuscating data.☆73Updated last year