Proof of concept code for Datadog Security Labs referenced exploits.
☆449Feb 13, 2026Updated 2 weeks ago
Alternatives and similar repositories for security-labs-pocs
Users that are interested in security-labs-pocs are comparing it to the libraries listed below
Sorting:
- CVE-2022-21449 Proof of Concept demonstrating its usage with a client running on a vulnerable Java version and a malicious TLS server☆123Apr 21, 2022Updated 3 years ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,267Updated this week
- ☆95Sep 18, 2021Updated 4 years ago
- ☆1,200Sep 2, 2022Updated 3 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆338Feb 13, 2026Updated 2 weeks ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆175Oct 26, 2024Updated last year
- Detects request smuggling via HTTP/2 downgrades.☆94Jul 30, 2022Updated 3 years ago
- Link sources to sinks in C# applications.☆150Apr 10, 2023Updated 2 years ago
- Probe endpoints consuming Java serialized objects to identify classes, libraries, and library versions on remote Java classpaths.☆613Mar 4, 2021Updated 5 years ago
- 🦄🔒 Awesome list of secrets in environment variables 🖥️☆902Sep 21, 2022Updated 3 years ago
- 🖇️ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.☆76Aug 22, 2024Updated last year
- This repo has been replaced by https://www.cloudvulndb.org☆726Jun 29, 2022Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,299Updated this week
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,215Feb 3, 2025Updated last year
- Azure Security Resources and Notes☆1,713Feb 17, 2026Updated 2 weeks ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- ☆15Oct 25, 2021Updated 4 years ago
- 🔑 Authz0 is an automated authorization test tool. Unauthorized access can be identified based on URLs and Roles & Credentials.☆427Feb 20, 2026Updated last week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆978Jan 12, 2024Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆953Dec 31, 2021Updated 4 years ago
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,530Feb 5, 2026Updated last month
- InQL is a robust, open-source Burp Suite extension for advanced GraphQL testing, offering intuitive vulnerability detection, customizable…☆1,737Feb 16, 2026Updated 2 weeks ago
- A tool to scrape the AWS ranges looking for a keyword in SSL certificate data.☆239Jan 10, 2024Updated 2 years ago
- ☆562Mar 27, 2025Updated 11 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆308Jan 6, 2023Updated 3 years ago
- SMBeagle - Fileshare auditing tool.☆744Nov 4, 2025Updated 4 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,073Feb 24, 2026Updated last week
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Apr 20, 2022Updated 3 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆936Sep 2, 2025Updated 6 months ago
- Repository to store exploits created by Assetnotes Security Research team☆181Nov 7, 2023Updated 2 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,424Jan 20, 2026Updated last month
- This repository includes code and IoCs that are the product of research done in Akamai's various security research teams.☆524Jun 10, 2025Updated 8 months ago
- Prototype Pollution and useful Script Gadgets☆1,589Jan 27, 2024Updated 2 years ago
- Tool to check for dependency confusion vulnerabilities in multiple package management systems☆778Aug 19, 2024Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year