DataDog / security-labs-pocsLinks
Proof of concept code for Datadog Security Labs referenced exploits.
☆439Updated 2 months ago
Alternatives and similar repositories for security-labs-pocs
Users that are interested in security-labs-pocs are comparing it to the libraries listed below
Sorting:
- ☆194Updated 6 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆385Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆190Updated 6 months ago
- S3 Account Search☆6Updated 7 months ago
- ☆561Updated 4 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆261Updated 2 months ago
- A utility to convert your AWS CLI credentials into AWS console access.☆239Updated 5 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆500Updated last year
- Black box fuzzer for web applications☆426Updated 11 months ago
- Tools to assess DNS security.☆152Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 2 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆173Updated 7 months ago
- Cloud-related research releases from the Rhino Security Labs team.☆388Updated 5 years ago
- A source code static analysis platform for AppSec enthusiasts.☆249Updated 3 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- ☆415Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 4 months ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆250Updated 7 months ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆235Updated this week
- ☆293Updated 10 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆249Updated 2 weeks ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆577Updated 6 months ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆628Updated 5 years ago
- Damn Vulnerable Cloud Application☆192Updated 6 years ago
- Identify privilege escalation paths within and across different clouds☆697Updated last month
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 6 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆181Updated 11 months ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆207Updated 3 years ago
- ☆249Updated 11 months ago
- Link sources to sinks in C# applications.☆144Updated 2 years ago