dlenski / what-vpn
Identify servers running various SSL VPNs based on protocol-specific behaviors
☆84Updated 5 months ago
Alternatives and similar repositories for what-vpn:
Users that are interested in what-vpn are comparing it to the libraries listed below
- grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitr…☆26Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 6 months ago
- egrets monitors egress☆46Updated 4 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Updated 4 years ago
- Mara is a userland pty/tty sniffer☆53Updated last year
- LDAP Swiss Army Knife☆49Updated last year
- ☆15Updated 3 years ago
- Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.☆13Updated 3 years ago
- A collection of captured SSH login credentials☆16Updated 3 years ago
- Source code and examples for Antignis☆36Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- This is a proof-of-concept of malicious software running inside of ModSecurity WAF.☆32Updated 3 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Updated last year
- AXFR all the things!☆26Updated 2 months ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Find what egress ports are allowed☆39Updated 2 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- ☆17Updated 2 years ago
- Keyhack - Golang API token/webhook validator☆16Updated this week
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- The SSH Multiplex Backdoor Tool☆63Updated 5 years ago
- ☆22Updated this week
- PCC's aim is to provide a high performing offline tool to easily assess which users are vulnerable to Password Reuse Attacks (a.k.a. Pass…☆18Updated 5 years ago
- A Go client for crobat☆24Updated 5 years ago
- Wrapper for concurrent batch processing of testssl.sh commands☆13Updated 6 years ago
- Find secrets on any machine from over 120 Different Signatures.☆47Updated 7 months ago
- Docker image for PowerShell remoting from Linux to Windows☆35Updated 6 years ago
- A simple, quick, and dirty websocket shell for PowerShell.☆20Updated 7 years ago
- ☆24Updated 10 months ago