AnubisSec / GroovyWaiterLinks
☆17Updated 3 years ago
Alternatives and similar repositories for GroovyWaiter
Users that are interested in GroovyWaiter are comparing it to the libraries listed below
Sorting:
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- ☆57Updated 2 years ago
- ☆36Updated 10 months ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 3 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 8 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- An Evil OIDC Server☆53Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 3 months ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated last year
- ☆90Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- ☆10Updated 6 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 11 months ago
- ☆12Updated 3 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 9 months ago
- Additional active scan checks for BURP☆27Updated 8 months ago
- ☆47Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 3 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 9 months ago
- InfoSec OpenAI Examples☆19Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated last month
- Manage attack surface data on Elasticsearch☆22Updated last year
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Docker container escape enumeration tool.☆11Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- WAF bypass PoC☆48Updated last year