Amap is a next-generation scanning tool for pentesters. It attempts
to identify applications even if they are running on a different port
than normal. It also identifies non-ascii based applications. This is
achieved by sending trigger packets, and looking up the responses in a
list of response strings.
Maintained by: Brenton Earl
Keywords: security,penetration testing,detection,nmap,testing,network,service,discovery,penetration
ChangeLog: amap
Homepage:
https://web-beta.archive.org/web/20160417072152/https://www.thc.org/thc-amap/
Download SlackBuild:
amap.tar.gz
amap.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
Individual Files: |
README |
amap.SlackBuild |
amap.info |
slack-desc |
slackware.diff |
slackware64.diff |
© 2006-2025 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds