oryxlabs / PolarDNSLinks
PolarDNS is a specialized authoritative DNS server suitable for penetration testing and vulnerability research.
☆224Updated 2 months ago
Alternatives and similar repositories for PolarDNS
Users that are interested in PolarDNS are comparing it to the libraries listed below
Sorting:
- Analyze pcaps with Zeek and a Grafana Dashboard☆177Updated last year
- Deep Linux runtime visibility meets Wireshark☆291Updated 3 weeks ago
- An ADCS honeypot to catch attackers in your internal network.☆289Updated 11 months ago
- Respotter is a Responder honeypot. Detect Responder in your environment as soon as it's spun up.☆195Updated 4 months ago
- quicmap is a simple yet quic (!) QUIC protocol scanner☆85Updated last year
- LDAP Watchdog: A real-time linux-compatible LDAP monitoring tool for detecting directory changes, providing visibility into additions, mo…☆187Updated last month
- A system administration or post-exploitation script to automatically extract the bitlocker recovery keys from a domain.☆369Updated 4 months ago
- SessionProbe is a multi-threaded tool designed for penetration testing and bug bounty hunting. It evaluates user privileges in web applic…☆450Updated last year
- Real Intelligence Threat Analytics (RITA) is a framework for detecting command and control communication through network traffic analysis…☆298Updated last week
- A web application that allows the users to check whether their SPF, DMARC and DKIM configuration is set up correctly.☆143Updated this week
- ☆543Updated last year
- Signature based honeypot detector tool written in Golang☆95Updated 2 months ago
- The Internets #1 Subdomain Takeover Tool☆254Updated 2 weeks ago
- EDRaser is a powerful tool for remotely deleting access logs, Windows event logs, databases, and other files on remote machines. It offer…☆366Updated last year
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆70Updated 11 months ago
- A reconnaissance tool for capturing and displaying SSIDs from device's Preferred Network List.☆147Updated 8 months ago
- Pen Test Report Generation and Assessment Collaboration☆526Updated last week
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆122Updated 4 months ago
- An offensive data enrichment pipeline☆680Updated last month
- Downloads Information from NIST (CVSS), first.org (EPSS), and CISA (Exploited Vulnerabilities) and combines them into one list. Reports f…☆141Updated 2 years ago
- A security analysis tool that identifies DNS queries made by browser extensions, empowering security teams to detect and investigate susp…☆164Updated 3 months ago
- God Mode Detection Rules☆134Updated 9 months ago
- Automation tool for Windows Deception Host Burn-In☆86Updated 6 months ago
- NTP Exfiltration Tool☆141Updated last year
- A Golang package for scanning private and public IPs for open TCP ports 👁️☆117Updated 2 months ago
- Enhance your malware detection with WAF + YARA (WAFARAY)☆108Updated 2 years ago
- Check subdomains for subdomain takeovers and other DNS tomfoolery☆345Updated this week
- Nuclei templates for honeypots detection.☆194Updated last year
- A comprehensive tool that provides an insightful analysis of Microsoft's monthly security updates.☆182Updated 2 months ago
- An open-source self-hosted purple team management web application.☆271Updated 3 weeks ago