bojanisc / quicmapLinks
quicmap is a simple yet quic (!) QUIC protocol scanner
☆87Updated last year
Alternatives and similar repositories for quicmap
Users that are interested in quicmap are comparing it to the libraries listed below
Sorting:
- Automation tool for Windows Deception Host Burn-In☆86Updated 7 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 6 months ago
- Signature based honeypot detector tool written in Golang☆98Updated 3 months ago
- Canary Detection☆183Updated last month
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- A fast and comprehensive tool for organizational network scanning☆133Updated last year
- ☆80Updated 2 years ago
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆71Updated last year
- Source code and examples for Antignis☆43Updated 2 years ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆144Updated last week
- God Mode Detection Rules☆134Updated 11 months ago
- Cisco IOS XE implant scanning & detection (CVE-2023-20198, CVE-2023-20273)☆39Updated last year
- Tail Certificate Transparency logs and extract hostnames☆112Updated 3 weeks ago
- JA4TScan is an active TCP server fingerprinting tool.☆84Updated 10 months ago
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆81Updated this week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆52Updated 7 months ago
- Citrix Scanner for CVE-2023-3519☆51Updated last year
- ☆26Updated 2 years ago
- DEFCON 31 slide deck and video link☆64Updated last month
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆130Updated 8 months ago
- Secret Scanner for Slack, Jira, Confluence, Asana, Wrike, Linear, Zendesk, GitHub, and GitLab☆63Updated last month
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 6 months ago
- HASH (HTTP Agnostic Software Honeypot)☆138Updated last year
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆29Updated last year
- A go-exploit to scan for implanted Cisco IOS XE Systems☆42Updated 8 months ago
- DVRPi is a RaspberryPi 4B firmware designed to teach hardware hacking through intentional vulnerabilities.☆35Updated this week
- POSIX script for mail security checks of domain names☆75Updated last year