bojanisc / quicmap
quicmap is a simple yet quic (!) QUIC protocol scanner
☆80Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for quicmap
- Automation tool for Windows Deception Host Burn-In☆76Updated 4 months ago
- God Mode Detection Rules☆130Updated 3 months ago
- Canary Detection☆160Updated 7 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆134Updated this week
- Signature based honeypot detector tool written in Golang☆84Updated 5 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 2 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆34Updated 10 months ago
- ☆79Updated last year
- Ping-based Information Lookup and Outbound Transfer☆75Updated 6 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆137Updated last year
- Living Off Security Tools☆37Updated 2 weeks ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆62Updated 4 months ago
- LOLESXi is a curated compilation of binaries/scripts available in VMware ESXi that are were used to by adversaries in their intrusions. T…☆104Updated 3 weeks ago
- ☆23Updated last year
- Respotter is a Responder honeypot! Catch attackers as soon as they spin up Responder in your environment.☆166Updated 2 months ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 11 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆122Updated last month
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆68Updated 2 weeks ago
- Convert a variety of log formats to CSV while enriching detected IPs with Geolocation, ASN, DNS, WhoIs, Shodan InternetDB and Threat Indi…☆98Updated 3 weeks ago
- ☆70Updated 2 weeks ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆123Updated 5 months ago
- ☆40Updated 2 months ago
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆213Updated 11 months ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrar…☆120Updated last week
- DEFCON 31 slide deck and video link☆58Updated 4 months ago
- All kinds of tiny shells☆59Updated last year
- An automated Breach and Attack Simulation lab with terraform. Built for IaC stability, consistency, and speed.☆165Updated 4 months ago
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆97Updated last year
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆49Updated 3 weeks ago
- CyberChef - Detection Engineering, TI, DFIR, Malware Analysis Edition☆62Updated 2 years ago