PolitoInc / EGOAlphaLinks
EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple projects in a REST API. Recognizing a need for such a tool, EGO was developed to utilize various open-source security tools and libraries to perform comprehensive reconnaissance scans.
☆28Updated last year
Alternatives and similar repositories for EGOAlpha
Users that are interested in EGOAlpha are comparing it to the libraries listed below
Sorting:
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- ☆54Updated 2 years ago
- ☆24Updated 6 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆41Updated 2 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆40Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆47Updated 5 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- ☆19Updated 2 years ago
- Public repo of Nuclei scanner templates.☆21Updated 2 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 4 months ago
- ☆20Updated 4 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- SAP Penetration Testing: A Comprehensive Analysis of SAP Security Issues☆40Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- Review of AWAE.OSWE☆31Updated 3 years ago
- ☆34Updated 2 years ago
- ☆27Updated 2 years ago
- OSCP Study Guide☆41Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- Repo for hosting rayder workflows☆62Updated 2 years ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated last year
- ☆78Updated last year