DataDog / security-labs-pocsLinks
Proof of concept code for Datadog Security Labs referenced exploits.
☆446Updated 4 months ago
Alternatives and similar repositories for security-labs-pocs
Users that are interested in security-labs-pocs are comparing it to the libraries listed below
Sorting:
- ☆215Updated last week
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated 3 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆409Updated 2 months ago
- ☆572Updated 5 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆192Updated last year
- ☆419Updated 2 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆252Updated 5 years ago
- S3 Account Search☆31Updated 5 months ago
- Tools to assess DNS security.☆153Updated last year
- Black box fuzzer for web applications☆436Updated 5 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- API Security Project aims to present unique attack & defense methods in API Security field☆289Updated 3 years ago
- A source code static analysis platform for AppSec enthusiasts.☆264Updated 2 weeks ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆239Updated 3 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated last month
- ☆314Updated 5 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆259Updated last year
- boostsecurityio/lotp☆141Updated 2 months ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆251Updated last week
- oauth security guidelines☆228Updated 6 years ago
- Awesome information for WebSockets security research☆297Updated 3 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆533Updated 3 months ago
- Kubernetes exploitation tool☆363Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆722Updated 3 months ago
- Damn Vulnerable Cloud Application☆201Updated 7 years ago
- A curated list of awesome browser security learning material.☆144Updated 3 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆305Updated 2 years ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆314Updated 4 months ago