g0ldencybersec / EasyEASM
Zero-dollar attack surface management tool
☆273Updated 10 months ago
Alternatives and similar repositories for EasyEASM:
Users that are interested in EasyEASM are comparing it to the libraries listed below
- ☆472Updated 10 months ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆378Updated 4 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆323Updated 4 months ago
- An open-source self-hosted purple team management web application.☆258Updated last month
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆615Updated 8 months ago
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆402Updated last month
- Tool to automatically exploit Active Directory privilege escalation paths shown by BloodHound☆522Updated 3 months ago
- ☆218Updated 8 months ago
- ☆318Updated last month
- Weekly updated list of missing CVEs in nuclei templates official repository. Mainly built for bug bounty, but useful for penetration test…☆347Updated this week
- Nuclei templates for honeypots detection.☆196Updated last year
- A RedTeam Toolkit☆395Updated 4 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆57Updated 10 months ago
- Discover new target domains using Content Security Policy☆396Updated last week
- PeTeReport is an open-source application vulnerability reporting tool.☆489Updated 8 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆349Updated last month
- ☆225Updated last week
- AI-powered ffuf wrapper☆294Updated 3 months ago
- Porch Pirate is the most comprehensive Postman recon / OSINT client and framework that facilitates the automated discovery and exploitati…☆397Updated last year
- LDAP enumeration tool implemented in Python3☆226Updated 5 months ago
- Fast and customizable vulnerability scanner For JIRA written in Python☆316Updated 2 months ago
- Escalate your SSRF vulnerabilities on Modern Cloud Environments. `surf` allows you to filter a list of hosts, returning a list of viable …☆624Updated last year
- Session Hijacking Visual Exploitation☆196Updated 11 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆577Updated 11 months ago
- A tool for auditing endpoints defined in exposed (Swagger/OpenAPI) definition files.☆594Updated 3 months ago
- An ADCS Exploitation Automation Tool Weaponizing Certipy and Coercer☆708Updated last year
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆346Updated last year
- Spoofy is a program that checks if a list of domains can be spoofed based on SPF and DMARC records.☆663Updated 4 months ago
- hakip2host takes a list of IP addresses via stdin, then does a series of checks to return associated domain names.☆437Updated 2 years ago
- Azure mindmap for penetration tests☆177Updated last year