Epiphany - is a pre-engagement \ self-assessment tool to identify weak spots of a web property from a DDoS attacker perspective.
- In the first stage, the tool crawls pages, enumerates POST and GET requests.
- On the second stage: Epiphany records response time for each page and detect ones that are most vulnerable for potential DDoS attack.
- Also, Epiphany performs heuristic discovery whether pages are cached or not.
Epiphany allow a clear understanding of a DDoS attack surface to build high-quality test cases for the DDoS assessment and recommendations for remediation and control improvements.
Epiphany should be used for authorized DDoS security assessment and/or nonprofit educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission.
git clone https://github.com/Cyberlands-io/epiphany.git
cd epiphany
pip3 install -r requirements.txt
python3 epiphany.py <host> <path_to_payload_lib>
File parameters:
-
positional arguments:
host
- Target Hostspayload
- Path to payload file for POST requests. Each line contains payload for the next parameter.
-
optional arguments:
-h, --help
- show this help message and exit-oC
- Output result to console
docker build -t epiphany .
docker run -v /tmp/:/app/reports/ epiphany google.com payloads
- Analysis of POST and GET requests For now it's works as default option
- Adding output to XML For now it's only one available output to file
- Adding option to perform apart GET and POST analysis
- Adding optional output to JSON
Please follow the LICENSE