Find what egress ports are allowed
☆47Nov 19, 2025Updated 5 months ago
Alternatives and similar repositories for egressinator
Users that are interested in egressinator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Addon for BHCE☆57Apr 1, 2025Updated last year
- Official code for the paper entitled "Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense"☆16Apr 10, 2025Updated last year
- ☆16Jan 9, 2025Updated last year
- Go library for mapping IP address ranges to cloud provider regions (currently: AWS and GCP)☆24Updated this week
- ☆18Feb 2, 2026Updated 2 months ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Autonomous AI C2☆32Jul 23, 2024Updated last year
- ADFS Brute-Force Login Script☆10Mar 19, 2024Updated 2 years ago
- CaptainCredz is a modular and discreet password-spraying tool.☆135Jul 22, 2025Updated 9 months ago
- A collection of Turbo Intruder scripts.☆71Feb 1, 2025Updated last year
- Linux CS bypass technique☆33Feb 4, 2025Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- An IAM Simulator that outputs detailed explains of how a request was evaluated.☆102Updated this week
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆39Aug 8, 2025Updated 8 months ago
- Burp Suite extension for testing Passkey systems.☆75Apr 1, 2025Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆16Dec 7, 2025Updated 4 months ago
- Framework for Monitoring File Ingestion Source for Yara Matches☆52Mar 10, 2025Updated last year
- SprayShark is a modular G-Suite password sprayer with threading!☆58May 17, 2025Updated 11 months ago
- Search engine for CTF writeups with instant results.☆156Mar 6, 2025Updated last year
- .NET deserialization hunter☆90Jul 21, 2024Updated last year
- Additional active scan checks for BURP☆28Oct 3, 2024Updated last year
- ☆18Jul 30, 2024Updated last year
- PoC Exploit for CVE-2023-35803 Unauthenticated Buffer Overflow in Aerohive HiveOS/Extreme Networks IQ Engine☆23Jul 12, 2023Updated 2 years ago
- ☆19Dec 18, 2024Updated last year
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Crystal Palace shared library to resolve & perform syscalls☆60Oct 29, 2025Updated 6 months ago
- One Conference 2024☆110Oct 1, 2024Updated last year
- Load a dynamic library from memory using a fuse mount☆32Sep 15, 2023Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Java archive implant toolkit.☆61Apr 20, 2025Updated last year
- Proof-of-concept modular implant platform leveraging v8☆55Mar 4, 2025Updated last year
- Groundbreaking Open-Source Chemical Threat Detection System☆29Aug 22, 2025Updated 8 months ago
- Decrypt encrypted SonicOSX firmware images☆19Feb 24, 2025Updated last year
- Webcam capture capability for Cobalt Strike as a BOF, with in-memory download options☆160Mar 26, 2025Updated last year
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆38Sep 25, 2024Updated last year
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆61Jul 13, 2025Updated 9 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆26Apr 18, 2026Updated last week
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Apr 23, 2026Updated last week
- Gain another host's network access permissions by establishing a stateful connection with a spoofed source IP☆84May 17, 2025Updated 11 months ago
- When good OAuth apps go rogue. Documents observed OAuth application tradecraft☆87Apr 7, 2026Updated 3 weeks ago
- Mapping of open-source detection rules and atomic tests.☆208Feb 16, 2026Updated 2 months ago