DataDog / security-labs-pocsLinks
Proof of concept code for Datadog Security Labs referenced exploits.
☆441Updated 3 months ago
Alternatives and similar repositories for security-labs-pocs
Users that are interested in security-labs-pocs are comparing it to the libraries listed below
Sorting:
- ☆196Updated 8 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆270Updated 4 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆393Updated last year
- ☆561Updated this week
- ☆293Updated this week
- Tools to assess DNS security.☆152Updated last year
- Black box fuzzer for web applications☆427Updated 2 weeks ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆190Updated 7 months ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 3 months ago
- ☆416Updated 2 years ago
- oauth security guidelines☆224Updated 6 years ago
- A utility to convert your AWS CLI credentials into AWS console access.☆240Updated 5 years ago
- A source code static analysis platform for AppSec enthusiasts.☆253Updated 4 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 5 months ago
- Kubernetes exploitation tool☆362Updated 11 months ago
- S3 Account Search☆10Updated 8 months ago
- ☆243Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆174Updated 8 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆285Updated 3 years ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆253Updated 8 months ago
- List of all the Publicly disclosed vulnerabilities of Public Cloud Provider like Amazon Web Services (AWS), Microsoft Azure, Google Cloud…☆362Updated 2 years ago
- Purposely vulnerable Java application to help lead secure coding workshops☆184Updated last year
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 2 years ago
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆274Updated 9 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆297Updated 2 years ago
- Damn Vulnerable Cloud Application☆195Updated 6 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆422Updated 8 months ago
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆633Updated 5 years ago
- boostsecurityio/lotp☆128Updated 3 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆294Updated last year