Epyon is a swiss army knife tool for pentesting DevOps ecosystems.
☆89Jan 26, 2026Updated last month
Alternatives and similar repositories for epyon
Users that are interested in epyon are comparing it to the libraries listed below
Sorting:
- ☆10Oct 9, 2024Updated last year
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- Js File Scanner☆11Mar 30, 2021Updated 4 years ago
- Training scenarios for cyber ranges☆15Apr 24, 2020Updated 5 years ago
- Slides and materials for conference presentations☆11Jun 4, 2023Updated 2 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Aug 4, 2024Updated last year
- Ready to use Openvas (GVM 11) in a Docker container☆13Jul 31, 2020Updated 5 years ago
- Scripts for public use that we've randomly written, or have updated from other people's work.☆40Jun 25, 2024Updated last year
- ☆20Mar 21, 2024Updated last year
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Parallelized enumeration tool for red team engagements and bug bounty programs.☆16Mar 31, 2021Updated 4 years ago
- OMLASP (Ideas Locas)☆21Nov 10, 2022Updated 3 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- NidhoggScript is a tool to generate "script" file that allows execution of multiple commands for Nidhogg☆50Feb 29, 2024Updated 2 years ago
- ☆26Mar 10, 2022Updated 3 years ago
- Este repositorio é apenas um exemplo de como adicionar OWASP ZAP Actions em uma pipeline de DevOps.☆19Mar 12, 2021Updated 4 years ago
- This is a working variant of the Mirai IOT botnet☆15Nov 22, 2022Updated 3 years ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- An implementation of a Model Context Protocol (MCP) for the Nuclei scanner. This tool enables context-aware vulnerability scanning by int…☆38Aug 4, 2025Updated 6 months ago
- ☆21Aug 3, 2022Updated 3 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆23Dec 11, 2022Updated 3 years ago
- ☆83Aug 27, 2025Updated 6 months ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- Socks4a proxy leveraging PIC, Websockets and static obfuscation on assembly level☆26Jul 21, 2022Updated 3 years ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆75Feb 13, 2026Updated 2 weeks ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Nov 24, 2019Updated 6 years ago
- 💣 REST and SOAP web API fuzzer☆25May 17, 2016Updated 9 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 3 months ago
- Whatsapp Bot model using whatsapp-web.js☆25Aug 23, 2023Updated 2 years ago
- Your syscall factory☆126Jan 13, 2026Updated last month
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Nov 9, 2022Updated 3 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- TEAM Mentor 3.x Released Code☆16Aug 5, 2016Updated 9 years ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- ☆27Jun 18, 2024Updated last year
- Lateral Movement☆126Nov 14, 2023Updated 2 years ago