Proof of concept code for Datadog Security Labs referenced exploits.
β449Apr 6, 2026Updated last week
Alternatives and similar repositories for security-labs-pocs
Users that are interested in security-labs-pocs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS serverβ123Mar 15, 2026Updated last month
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β76Aug 22, 2024Updated last year
- Granular, Actionable Adversary Emulation for the Cloudβ2,292Apr 9, 2026Updated last week
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.β612Mar 4, 2021Updated 5 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID securityβ176Oct 26, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways β’ AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β89Jan 28, 2024Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ59Sep 20, 2023Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.β341Updated this week
- Detects request smuggling via HTTP/2 downgrades.β94Jul 30, 2022Updated 3 years ago
- β95Sep 18, 2021Updated 4 years ago
- β1,202Sep 2, 2022Updated 3 years ago
- Kubernetes Unhinged Shell πβ46Oct 8, 2022Updated 3 years ago
- β15Oct 25, 2021Updated 4 years ago
- Link sources to sinks in C# applications.β150Apr 10, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient β’ AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Repository to store exploits created by Assetnotes Security Research teamβ182Nov 7, 2023Updated 2 years ago
- π¦π Awesome list of secrets in environment variables π₯οΈβ907Sep 21, 2022Updated 3 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized enβ¦β1,218Feb 3, 2025Updated last year
- Compares and analyzes GCP IAM roles.β79Mar 9, 2025Updated last year
- An Evil OIDC Serverβ53Oct 19, 2022Updated 3 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"β77Apr 20, 2022Updated 3 years ago
- an Evil Java RMI Registry.β50Feb 8, 2023Updated 3 years ago
- Automating situational awareness for cloud penetration tests.β2,340Updated this week
- π Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.β428Apr 8, 2026Updated last week
- Managed Database hosting by DigitalOcean β’ AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerabilityβ964Dec 31, 2021Updated 4 years ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!β1,069Mar 24, 2026Updated 3 weeks ago
- A Burp Suite Extension for parsing Project Files from the CLI.β92Jan 16, 2026Updated 3 months ago
- This repo has been replaced by https://www.cloudvulndb.orgβ727Jun 29, 2022Updated 3 years ago
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizableβ¦β1,758Feb 16, 2026Updated 2 months ago
- User enumeration and password spraying tool for testing Azure ADβ71Mar 3, 2022Updated 4 years ago
- Azure Security Resources and Notesβ1,734Feb 17, 2026Updated last month
- A simple tool to audit your AWS/GCP infrastructure for misconfiguration or potential security issues with plugins integrationβ340Apr 1, 2026Updated 2 weeks ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.β5,128Mar 30, 2026Updated 2 weeks ago
- Virtual machines for every use case on DigitalOcean β’ AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Tool to check for dependency confusion vulnerabilities in multiple package management systemsβ779Aug 19, 2024Updated last year
- Peirates - Kubernetes Penetration Testing toolβ1,439Jan 20, 2026Updated 2 months ago
- SMBeagle - Fileshare auditing tool.β744Nov 4, 2025Updated 5 months ago
- JNDI-Exploitation-KitοΌA modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP Sβ¦β936Sep 2, 2025Updated 7 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogicβ307Jan 6, 2023Updated 3 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposesβ2,582Feb 5, 2026Updated 2 months ago
- Checks all maintainers of all NPM and Pypi packages for hijackable packages through domain re-registrationβ309Updated this week