oryxlabs / PolarDNSLinks
PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.
☆225Updated last month
Alternatives and similar repositories for PolarDNS
Users that are interested in PolarDNS are comparing it to the libraries listed below
Sorting:
- Analyze pcaps with Zeek and a Grafana Dashboard☆182Updated last year
- Deep Linux runtime visibility meets Wireshark☆292Updated last month
- quicmap is a simple yet quic (!) QUIC protocol scanner☆88Updated last year
- Automation tool for Windows Deception Host Burn-In☆86Updated 8 months ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆144Updated 2 years ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆198Updated 3 weeks ago
- Signature based honeypot detector tool written in Golang☆102Updated 5 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated this week
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆177Updated 6 months ago
- Bitor Scanning Software☆404Updated 3 weeks ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆407Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆86Updated 3 weeks ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆183Updated 2 weeks ago
- Repo to hold wazuh manager mcp server☆52Updated last month
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆189Updated 4 months ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆160Updated 3 years ago
- Linux Security and Monitoring Scripts☆325Updated 10 months ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆38Updated 7 months ago
- Multi-services Honeypot Solution with AI support and dynamic HTTP template☆139Updated this week
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆161Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆137Updated last year
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆103Updated 8 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆126Updated 7 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆51Updated 7 months ago
- CRADLE is a collaborative platform for Cyber Threat Intelligence analysts. It streamlines threat investigations with integrated note-taki…☆252Updated this week
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated last year
- NTP Exfiltration Tool☆145Updated last year
- An ADCS honeypot to catch attackers in your internal network.☆309Updated last year
- Dredging up secrets from the depths of the file system☆131Updated 9 months ago
- Source code and examples for Antignis☆43Updated 2 years ago