bojanisc / quicmapLinks
quicmap is a simple yet quic (!) QUIC protocol scanner
☆87Updated last year
Alternatives and similar repositories for quicmap
Users that are interested in quicmap are comparing it to the libraries listed below
Sorting:
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- Signature based honeypot detector tool written in Golang☆95Updated 3 months ago
- Canary Detection☆182Updated last month
- God Mode Detection Rules☆134Updated 10 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- HTTP Headers Hashing (HHHash) is a technique used to create a fingerprint of an HTTP server based on the headers it returns.☆77Updated last year
- DEFCON 31 slide deck and video link☆63Updated 3 weeks ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 5 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- VeilTransfer is a data exfiltration utility designed to test and enhance the detection capabilities. This tool simulates real-world data …☆141Updated 4 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 5 months ago
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- [GITLAB MIRROR] Ludus is a system to build easy to use cyber environments for testing and development.☆78Updated 2 weeks ago
- Knowledge base on cybercriminal concealment techniques☆70Updated last month
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated last week
- Lua plugin to extract data from Wireshark and convert it into MISP format☆48Updated last year
- ☆142Updated 2 weeks ago
- ☆24Updated 2 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- ☆80Updated 2 years ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Updated 9 months ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆124Updated last year
- A comprehensive workshop aimed to equip participants with an in-depth understanding of modern Command and Control (C2) concepts, focusing…☆102Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Source code and examples for Antignis☆43Updated 2 years ago
- Analyse a forensic target (such as a directory) to find and report files found and not found from CIRCL hashlookup public service - https…☆126Updated last year
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 2 weeks ago
- ☆26Updated 2 years ago
- ☆74Updated 2 weeks ago