A pre-DDoS security assessment tool
☆118Jun 11, 2021Updated 4 years ago
Alternatives and similar repositories for epiphany
Users that are interested in epiphany are comparing it to the libraries listed below
Sorting:
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Sep 14, 2021Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆89Feb 11, 2022Updated 4 years ago
- ☆15Jun 5, 2019Updated 6 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Nov 28, 2025Updated 3 months ago
- ☆29Jan 31, 2025Updated last year
- AWS SSO serverless phishing API.☆32Jun 30, 2021Updated 4 years ago
- An open-source listing of cybersecurity technology mapped to the NIST Cybersecurity Framework (CSF)☆127Jul 14, 2024Updated last year
- Create visualization from Shodan query☆74May 25, 2021Updated 4 years ago
- XDNR is a X0R Cryptor along with DEC/N0T/R0R encoder plus random byte insertion encoder, that generates null free encrypted and encoded s…☆17Jul 12, 2022Updated 3 years ago
- Modron - Cloud security compliance☆34Dec 11, 2024Updated last year
- Simple reverse shell over Slack☆57Apr 18, 2021Updated 4 years ago
- ☆74Sep 30, 2020Updated 5 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Nov 19, 2021Updated 4 years ago
- ☆114Jun 8, 2023Updated 2 years ago
- Enumerate RIDs using pure Python☆32Jan 5, 2026Updated 2 months ago
- Tool for assessing on-premises Microsoft servers authentication such as ADFS, Skype, Exchange, and RDWeb☆148Dec 3, 2020Updated 5 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Feb 10, 2026Updated 3 weeks ago
- ☆41Apr 5, 2025Updated 11 months ago
- Swiss army knife Webserver in Golang. Keep simple like the python SimpleHTTPServer but with many features☆199Mar 27, 2025Updated 11 months ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Apr 14, 2023Updated 2 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- Automatically grab and crack WPA-2 handshakes with distributed client-server architecture☆196Dec 22, 2021Updated 4 years ago
- CloudSplaining on AWS Managed Policies☆44Sep 8, 2025Updated 5 months ago
- One-stop TLS traffic inspection and manipulation using dynamic instrumentation☆243Aug 26, 2022Updated 3 years ago
- A framework for creating COM-based bypasses utilizing vulnerabilities in Microsoft's WDAPT sensors.☆297Aug 18, 2023Updated 2 years ago
- ☆576Jul 12, 2025Updated 7 months ago
- ☆25Jul 5, 2018Updated 7 years ago
- CLI tool for PKCS7 padding oracle attacks☆143Feb 25, 2021Updated 5 years ago
- Rip Raw is a small tool to analyse the memory of compromised Linux systems.☆134Jan 31, 2022Updated 4 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated last week
- wsb-detect enables you to detect if you are running in Windows Sandbox ("WSB")☆373Feb 27, 2023Updated 3 years ago
- A checklist of practices for organizations dealing with account takeover (ATO)☆276Oct 4, 2024Updated last year
- Tools to assess the DNS security of web applications☆127Oct 5, 2022Updated 3 years ago
- macOS persistence tool☆229Feb 9, 2022Updated 4 years ago
- RedHerd is a collaborative and serverless framework for orchestrating a geographically distributed group of assets.☆74Apr 25, 2023Updated 2 years ago
- Rapidly apply hundreds of security controls in Azure☆183May 1, 2025Updated 10 months ago