Epyon is a swiss army knife tool for pentesting DevOps ecosystems.
☆89Mar 13, 2026Updated last week
Alternatives and similar repositories for epyon
Users that are interested in epyon are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 1C RAS Offensive Security Tool☆28Oct 4, 2023Updated 2 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Jun 25, 2024Updated last year
- Some of my presentations and published articles in different conferences☆18Sep 27, 2021Updated 4 years ago
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 4 months ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Cloud Formation resources for integrating Lacework with an AWS Organization (NOT using Control Tower)☆11Jan 7, 2026Updated 2 months ago
- ☆10Oct 9, 2024Updated last year
- Multi-threading Leaks/Intelligence file parser☆15Mar 16, 2026Updated last week
- A BASH Script to automate the installation of the most popular bug bounty tools☆26Dec 24, 2025Updated 3 months ago
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated 2 years ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆19Oct 27, 2024Updated last year
- Programmatically start WebClient from an unprivileged session to enable that juicy privesc.☆78Feb 8, 2023Updated 3 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- A Rust library along with a Win32 GUI application to determine the driver load order of a Windows system (cf. https://colinfinck.de/posts…☆12Jan 26, 2025Updated last year
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago
- Simple Shellcode Runner in Rust Language☆18Dec 8, 2023Updated 2 years ago
- ☆15Dec 12, 2023Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- OWASP Foundation Web Respository☆22Oct 9, 2025Updated 5 months ago
- ☆26Mar 10, 2022Updated 4 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- ☆19Jun 19, 2025Updated 9 months ago
- Install, uninstall and control remote and local windows services☆13Feb 4, 2013Updated 13 years ago
- Command-line utility for managing PKI infrastructure☆14Aug 14, 2022Updated 3 years ago
- ☆27Jun 18, 2024Updated last year
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- ☆83Aug 27, 2025Updated 6 months ago
- Yet another way to find where to report an abuse☆31Jan 25, 2025Updated last year
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Jun 11, 2020Updated 5 years ago
- A National Vulnerability Database (NVD) API query tool☆17Jun 27, 2023Updated 2 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- Ready to use Openvas (GVM 11) in a Docker container☆13Jul 31, 2020Updated 5 years ago