EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.
☆19Jul 17, 2022Updated 3 years ago
Alternatives and similar repositories for EPH
Users that are interested in EPH are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆25Oct 1, 2023Updated 2 years ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Feb 11, 2025Updated last year
- By using its cutting edge technology (lolnope), you can now have a persistent multi reverse pty handler!☆105Mar 30, 2025Updated last year
- Yet another content discovery tool☆118Nov 16, 2024Updated last year
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆40Oct 29, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Multi-thread AzureAD Autologon SSO Password Sprayer.☆37Oct 9, 2021Updated 4 years ago
- OSEP - Offsec Expert Professional☆21Jun 23, 2024Updated last year
- Microsoft Azure Exploitation Framework☆59Jun 30, 2021Updated 4 years ago
- ☆16Jun 16, 2021Updated 4 years ago
- A powerful and clean bash script to dump and extract information from Project Discovery's Chaos Project https://chaos.projectdiscovery.io…☆25Mar 31, 2022Updated 4 years ago
- This tool allows to automatically test for Content Security Policy bypass payloads.☆44Sep 4, 2024Updated last year
- ☆51Jan 20, 2022Updated 4 years ago
- a map for the azure oriented pentests☆70Jul 3, 2023Updated 2 years ago
- Extract most frequent words in a list of subdomains☆13Feb 15, 2025Updated last year
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 4 years ago
- A Python script to backup all repos (public or private) of a user.☆23Oct 2, 2023Updated 2 years ago
- ☆12May 31, 2023Updated 2 years ago
- AAD related enumeration in Nim☆131Sep 7, 2023Updated 2 years ago
- Copy the properties and groups of a user from neo4j (bloodhound) to create an identical golden ticket.☆104May 6, 2024Updated 2 years ago
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆20Jul 7, 2021Updated 4 years ago
- ☆26Jun 2, 2022Updated 3 years ago
- List the ETW provider(s) in the registration table of a process.☆82Sep 20, 2023Updated 2 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Netwrix Account Lockout Examiner 4.1 Domain Admin Account Credential Disclosure Vulnerability☆28Nov 11, 2020Updated 5 years ago
- ☆32Jan 31, 2026Updated 3 months ago
- Fast website scraper and wordlist generator☆84May 6, 2025Updated last year
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated 2 years ago
- Fun GUI for Group3rs output log☆37Aug 14, 2023Updated 2 years ago
- The Primate Pack is a suite of extensions for Caido.☆14Sep 29, 2024Updated last year
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Repository for doing pen300 exercises☆26Oct 21, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Citrix CVE-2023-4966 from assetnote modified for parallel and file handling☆11Oct 25, 2023Updated 2 years ago
- Active Directory certificate abuse☆43Oct 9, 2022Updated 3 years ago
- Evildork targeting your fiancee👁️☆94Jul 30, 2023Updated 2 years ago
- Chromium Cookie import / export tool☆11Jul 21, 2024Updated last year
- notepad++堆缓冲区溢出漏洞CVE-2023-40031 分析与复现☆15Sep 8, 2023Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago