oryxlabs / PolarDNSLinks
PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.
☆232Updated 6 months ago
Alternatives and similar repositories for PolarDNS
Users that are interested in PolarDNS are comparing it to the libraries listed below
Sorting:
- Analyze pcaps with Zeek and a Grafana Dashboard☆189Updated last year
- Deep Linux runtime visibility meets Wireshark☆302Updated 2 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆89Updated last year
- Signature based honeypot detector tool written in Golang☆107Updated 10 months ago
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆194Updated last week
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆142Updated 3 years ago
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆101Updated 2 weeks ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆197Updated 2 months ago
- Leveraging MISP indicators via a pDNS-based infrastructure as a poor man’s SOC.☆55Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- JA4TScan is an active TCP server fingerprinting tool.☆102Updated last year
- Linux Security and Monitoring Scripts☆327Updated 4 months ago
- ☆105Updated last month
- Automation tool for Windows Deception Host Burn-In☆86Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- How to setup a honeypot with an IDS, ELK and TLS traffic inspection☆164Updated 3 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆185Updated 11 months ago
- NTP Exfiltration Tool☆147Updated 2 years ago
- RequestShield is a 100% Free and OpenSource tool designed to analyze HTTP access.logs and identify suspicious HTTP requests and potential…☆106Updated last year
- Knowledge base on cybercriminal concealment techniques☆92Updated 8 months ago
- Fingerprint-aware TLS reverse proxy. Use Finch to outsmart bad traffic—collect client fingerprints (JA3, JA4 +QUIC, JA4H, HTTP/2) and act…☆283Updated last month
- Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group☆86Updated last year
- ☆83Updated 2 months ago
- SharpEye: Advanced Linux Intrusion Detection and Threat Hunting System☆170Updated this week
- Create honeypots for cloud environments☆109Updated 3 months ago
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆501Updated 3 weeks ago
- Small scripts to help with Linux forensics and incident response.☆56Updated 3 months ago
- Repo to hold wazuh manager mcp server☆71Updated 4 months ago
- DECeption with Evaluative Integrated Validation Engine (DECEIVE): Let an LLM do all the hard honeypot work!☆274Updated 7 months ago
- Modular web-application honeypot platform built using go and gin☆63Updated last year