Amap is a next-generation scanning tool for pentesters. It attempts
to identify applications even if they are running on a different port
than normal. It also identifies non-ascii based applications. This is
achieved by sending trigger packets, and looking up the responses in a
list of response strings.
Maintained by: Brenton Earl
Keywords: security,penetration testing,detection,nmap,testing,network,service,discovery,penetration
ChangeLog: amap
Homepage:
https://web-beta.archive.org/web/20160417072152/https://www.thc.org/thc-amap/
Download SlackBuild:
amap.tar.gz
amap.tar.gz.asc (FAQ)
(the SlackBuild does not include the source)
| Individual Files: |
| README |
| amap.SlackBuild |
| amap.info |
| slack-desc |
| slackware.diff |
| slackware64.diff |
© 2006-2026 SlackBuilds.org Project. All rights reserved.
Slackware® is a registered trademark of
Patrick Volkerding
Linux® is a registered trademark of
Linus Torvalds