PolitoInc / EGOAlphaLinks
EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple projects in a REST API. Recognizing a need for such a tool, EGO was developed to utilize various open-source security tools and libraries to perform comprehensive reconnaissance scans.
☆28Updated last year
Alternatives and similar repositories for EGOAlpha
Users that are interested in EGOAlpha are comparing it to the libraries listed below
Sorting:
- Fast website scraper and wordlist generator☆82Updated 8 months ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- ☆24Updated 6 years ago
- ☆54Updated 3 weeks ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Updated 9 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆126Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆42Updated 2 years ago
- ☆67Updated 2 years ago
- ☆76Updated last year
- Handy scripts and one-liners to make life easier☆36Updated 2 years ago
- TruffleHog Explorer, a user-friendly web-based tool to visualize and analyze data extracted using TruffleHog.☆52Updated last month
- ☆27Updated 2 years ago
- ☆19Updated 2 years ago
- Automates the network enumeration process in a fire-and-forget manner, among many more powerful functions. Zero effort, zero error networ…☆65Updated 2 weeks ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆49Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- OSCP Study Guide☆42Updated 3 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆56Updated last year
- One line command and control backdoors for APIs and web applications.☆51Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆24Updated 2 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago