epiphany
epiphany copied to clipboard
A pre-DDoS security assessment tool
Epiphany
Description
Epiphany - is a pre-engagement \ self-assessment tool to identify weak spots of a web property from a DDoS attacker perspective.
- In the first stage, the tool crawls pages, enumerates POST and GET requests.
- On the second stage: Epiphany records response time for each page and detect ones that are most vulnerable for potential DDoS attack.
- Also, Epiphany performs heuristic discovery whether pages are cached or not.
Epiphany allow a clear understanding of a DDoS attack surface to build high-quality test cases for the DDoS assessment and recommendations for remediation and control improvements.
Disclamer
Epiphany should be used for authorized DDoS security assessment and/or nonprofit educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.
Installation
git clone https://github.com/Cyberlands-io/epiphany.git
cd epiphany
pip3 install -r requirements.txt
Usage
python3 epiphany.py <host> <path_to_payload_lib>
File parameters:
-
positional arguments:
-
host
- Target Hosts -
payload
- Path to payload file for POST requests. Each line contains payload for the next parameter.
-
-
optional arguments:
-
-h, --help
- show this help message and exit -
-oC
- Output result to console
-
Docker usage
docker build -t epiphany .
docker run -v /tmp/:/app/reports/ epiphany google.com payloads
To do
- [x] Analysis of POST and GET requests For now it's works as default option
- [x] Adding output to XML For now it's only one available output to file
- [ ] Adding option to perform apart GET and POST analysis
- [ ] Adding optional output to JSON
Authors
License
Please follow the LICENSE