Amap is a next-generation scanning tool for pentesters. It attempts to identify
applications even if they are running on a different port than normal.
It also identifies non-ascii based applications. This is achieved by sending
trigger packets, and looking up the responses in a list of response strings.
Maintained by: Brenton Earl
Keywords: security,penetration testing,detection,nmap
ChangeLog: amap
Homepage:
http://www.thc.org/thc-amap/
Download SlackBuild:
amap.tar.gz
amap.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
Individual Files: |
README |
amap.SlackBuild |
amap.info |
slack-desc |
slackware.diff |
slackware64.diff |
© 2006-2023 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds