Contrast-Security-OSS / BurptrastLinks
Burp Plugin for Contrast Security
β16Updated last month
Alternatives and similar repositories for Burptrast
Users that are interested in Burptrast are comparing it to the libraries listed below
Sorting:
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.β134Updated 5 years ago
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β77Updated last year
- Route53/CloudFront Vulnerability Assessment Utilityβ87Updated 2 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.β77Updated 4 years ago
- β124Updated 2 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)β31Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standardβ28Updated 5 years ago
- β69Updated 4 months ago
- This repo gives an overview of some GCP metadata API attack and defend patternsβ77Updated 5 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wikiβ212Updated last year
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulneβ¦β31Updated 3 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrailβ61Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parametersβ107Updated last year
- β139Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.β78Updated 3 years ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rulesβ40Updated 4 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpokβ171Updated 9 months ago
- materials we hand outβ148Updated 4 months ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.β111Updated 5 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS weaβ¦β174Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parametersβ65Updated 2 years ago
- drHEADer helps with the audit of security headers received in response to a single request or a list of requests.β111Updated 10 months ago
- A tool geared towards pentesting APIs using OpenAPI definitions.β182Updated 3 years ago
- Search exposed EBS volumes for secretsβ302Updated 2 years ago
- AWS Security Checksβ40Updated 7 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!β134Updated 2 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in filesβ93Updated last year
- β114Updated 2 years ago
- Damn Vulnerable Cloud Applicationβ200Updated 7 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.β78Updated 4 years ago