Contrast-Security-OSS / Burptrast
Burp Plugin for Contrast Security
β16Updated 4 months ago
Alternatives and similar repositories for Burptrast:
Users that are interested in Burptrast are comparing it to the libraries listed below
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.β135Updated 4 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β73Updated 3 years ago
- ποΈ STRIDE vs. ASVS equivalence tableβ75Updated 5 months ago
- Semgrep rules corresponding to the OWASP ASVS standardβ27Updated 4 years ago
- β63Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulneβ¦β31Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ63Updated last year
- A simple file-based scanner to look for potential AWS access and secret keys in filesβ90Updated 11 months ago
- This repo gives an overview of some GCP metadata API attack and defend patternsβ76Updated 4 years ago
- A Burp plugin to export findings to DefectDojoβ30Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parametersβ62Updated last year
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!β120Updated 2 years ago
- β133Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ58Updated last year
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.β76Updated 2 years ago
- materials we hand outβ141Updated last week
- Scripts and tools for AWS Pentestβ51Updated 4 years ago
- Reporting Tips for Penetration Testersβ31Updated 3 years ago
- Route53/CloudFront Vulnerability Assessment Utilityβ85Updated last year
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)β30Updated last year
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volumβ¦β15Updated 4 years ago
- β109Updated last year
- β34Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Traβ¦β19Updated 3 years ago
- Virtual Security Operations Centerβ50Updated last year
- This script is a multi-threaded Okta password sprayer.β70Updated last year
- Research on the enumeration of IAM permissions without logging to CloudTrailβ60Updated 3 years ago
- Maturity Model Collaborative projectβ14Updated last year
- Custom scripts for the PIPER Burp extensions.β97Updated last year
- Security checks for http headers and cookiesβ24Updated 4 years ago