oryxlabs / PolarDNSLinks
PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.
☆224Updated 2 months ago
Alternatives and similar repositories for PolarDNS
Users that are interested in PolarDNS are comparing it to the libraries listed below
Sorting:
- Deep Linux runtime visibility meets Wireshark☆291Updated last week
- quicmap is a simple yet quic (!) QUIC protocol scanner☆87Updated last year
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆289Updated 11 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆196Updated last week
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆310Updated last week
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆123Updated 4 months ago
- Signature based honeypot detector tool written in Golang☆97Updated 3 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- A delicious, but malicious SSL-VPN server 🌮☆233Updated 2 weeks ago
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆373Updated 4 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated last week
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆184Updated 3 months ago
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆117Updated 3 months ago
- A free and open platform for detecting and preventing email attacks like BEC, malware, and credential phishing. Gain visibility and contr…☆216Updated 2 weeks ago
- Pen Test Report Generation and Assessment Collaboration☆531Updated this week
- The Internets #1 Subdomain Takeover Tool☆260Updated 3 weeks ago
- God Mode Detection Rules☆134Updated 10 months ago
- ☆543Updated last year
- The purpose of this project is to publish and maintain the deployment PowerShell script that automates deployments for Active Directory C…☆252Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆79Updated 9 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆375Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆77Updated last week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- ☆143Updated 3 weeks ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆148Updated 9 months ago
- This repository contains a comprehensive list of over 30k dynamic DNS domains as of 2024. The list is provided for informational purposes…☆97Updated 6 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆123Updated 3 weeks ago