oryxlabs / PolarDNSLinks
PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.
☆228Updated 3 months ago
Alternatives and similar repositories for PolarDNS
Users that are interested in PolarDNS are comparing it to the libraries listed below
Sorting:
- Analyze pcaps with Zeek and a Grafana Dashboard☆186Updated last year
- Deep Linux runtime visibility meets Wireshark☆294Updated 3 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆96Updated 2 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 10 months ago
- Signature based honeypot detector tool written in Golang☆105Updated 7 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 weeks ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆145Updated 2 weeks ago
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆143Updated 2 years ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆52Updated last week
- A TLS MITM proxy for TCP/TLS/UDP traffic, with support for TLS upgrades like STARTTLS, PostgreSQL, and more.☆270Updated 2 weeks ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆105Updated 10 months ago
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆190Updated 6 months ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆183Updated 8 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year
- HASH (HTTP Agnostic Software Honeypot)☆140Updated last year
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆163Updated 2 months ago
- ☆36Updated last week
- NTP Exfiltration Tool☆146Updated last year
- Source code and examples for Antignis☆44Updated 3 years ago
- Explore the GOAD Active Directory lab in 5 minutes with Adalanche☆40Updated 9 months ago
- A network technique that decloaks a VPN users traffic on a local network without disconnecting them from a VPN.☆137Updated last year
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆241Updated 2 months ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆425Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- Modern honeypot supporting multiple services, realistic website cloning, and AI-powered features☆144Updated this week
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 8 months ago
- Create honeypots for cloud environments☆99Updated 3 weeks ago
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆163Updated 3 years ago
- ☆65Updated this week