Nishacid / EPH
EPH is a tool which allows you to perform scans to find exposed administration panels that can lead to security vulnerabilities.
☆18Updated 2 years ago
Alternatives and similar repositories for EPH:
Users that are interested in EPH are comparing it to the libraries listed below
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- ☆27Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- ☆56Updated 11 months ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 3 months ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- DNS resolution tracing tool☆34Updated 3 years ago
- Simple bash Script to automate initial recon using (httpx, puredns, regulator, wayback, katana, aquatone)☆34Updated 3 weeks ago
- ☆42Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆65Updated 2 years ago
- ☆55Updated 2 years ago
- Checks if files is accessible based on the source code.☆16Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆122Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Next generation fireprox AWS API endpoint creation utility.☆52Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆27Updated 2 years ago
- ☆68Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- This Python script can enumerate all URLs present in robots.txt files, and test whether they can be accessed or not.☆43Updated 2 months ago
- Vulnerable Windows Application☆15Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Archived Please go to https://github.com/adamjsturge/xsshunter-go☆31Updated last year
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Striping CDN IPs from a list of IP Addresses☆77Updated 2 years ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 6 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago