Cyberlands-io / epiphany
A pre-DDoS security assessment tool
☆120Updated 3 years ago
Alternatives and similar repositories for epiphany:
Users that are interested in epiphany are comparing it to the libraries listed below
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆152Updated 9 months ago
- Weaponizing Live CT logs for automated monitoring of assets☆132Updated 3 years ago
- automated password spraying tool☆147Updated 3 years ago
- FestIn - Open S3 Bucket Scanner☆230Updated 4 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.☆59Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆119Updated 2 years ago
- Search for vulnerabilities and exposures while filtering based on age, keywords, and other parameters.☆123Updated 2 years ago
- Collaborative pentest tool with highly customizable tools☆71Updated 3 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆192Updated 9 months ago
- Create visualization from Shodan query☆71Updated 3 years ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆121Updated 9 months ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆79Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 4 years ago
- A CLI tool to identify the hash type of a given hash.☆109Updated 2 years ago
- ☆58Updated last year
- AWS, Azure, Alibaba and Google bucket scanner☆142Updated last year
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆188Updated 6 months ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆63Updated 3 years ago
- Scans SPF and DMARC records for issues that could allow email spoofing.☆128Updated 2 years ago
- Boomerang is a tool to expose multiple internal servers to web/cloud. Agent & Server are pretty stable and can be used in Red Team for Mu…☆217Updated 3 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 3 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆333Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆142Updated last year
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆72Updated 2 years ago