bojanisc / quicmap
quicmap is a simple yet quic (!) QUIC protocol scanner
☆84Updated 11 months ago
Alternatives and similar repositories for quicmap:
Users that are interested in quicmap are comparing it to the libraries listed below
- Canary Detection☆164Updated 10 months ago
- Automation tool for Windows Deception Host Burn-In☆82Updated 2 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆36Updated last month
- Ping-based Information Lookup and Outbound Transfer☆76Updated 10 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆46Updated this week
- Signature based honeypot detector tool written in Golang☆89Updated 2 months ago
- ☆24Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆47Updated last year
- ☆79Updated last year
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆74Updated 3 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆138Updated this week
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆75Updated last year
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆117Updated 3 weeks ago
- DEFCON 31 slide deck and video link☆58Updated 7 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆66Updated 7 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆191Updated last month
- tool for identifying guest relationships between companies☆84Updated 7 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- God Mode Detection Rules☆134Updated 6 months ago
- ☆124Updated last week
- Traps web spiders☆66Updated 4 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆127Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆98Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆147Updated 2 weeks ago
- PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.☆215Updated last week
- ☆40Updated 5 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆122Updated 3 months ago
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆132Updated last year
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆164Updated 3 months ago