DataDog / security-labs-pocsLinks
Proof of concept code for Datadog Security Labs referenced exploits.
☆449Updated last month
Alternatives and similar repositories for security-labs-pocs
Users that are interested in security-labs-pocs are comparing it to the libraries listed below
Sorting:
- ☆226Updated last month
- ☆576Updated 7 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆412Updated 4 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆191Updated last year
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆282Updated 5 months ago
- Tools to assess DNS security.☆153Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆256Updated 5 years ago
- S3 Account Search☆35Updated 6 months ago
- A source code static analysis platform for AppSec enthusiasts.☆267Updated 2 months ago
- Black box fuzzer for web applications☆437Updated 6 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆286Updated 3 years ago
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆246Updated 3 years ago
- oauth security guidelines☆230Updated 6 years ago
- boostsecurityio/lotp☆138Updated 2 weeks ago
- Kubernetes exploitation tool☆364Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆544Updated 5 months ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆278Updated last year
- ☆314Updated 7 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Updated 3 months ago
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆252Updated last week
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆426Updated 2 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆191Updated last year
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 3 years ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Updated 3 years ago
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆726Updated 4 months ago
- ☆422Updated 3 years ago
- ☆245Updated last year
- Cloud-related research releases from the Rhino Security Labs team.☆392Updated 5 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆314Updated 2 weeks ago