DataDog / security-labs-pocs
Proof of concept code for Datadog Security Labs referenced exploits.
☆425Updated last year
Alternatives and similar repositories for security-labs-pocs:
Users that are interested in security-labs-pocs are comparing it to the libraries listed below
- ☆184Updated 4 months ago
- ☆559Updated 3 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆186Updated 3 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆258Updated last week
- A source code static analysis platform for AppSec enthusiasts.☆237Updated last month
- Grammar-based HTTP/1 fuzzer with mutation ability☆248Updated 4 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆171Updated 4 months ago
- Black box fuzzer for web applications☆425Updated 8 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆376Updated 11 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆289Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆102Updated last month
- Tools to assess DNS security.☆151Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆132Updated last week
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- S3 Account Search☆269Updated 5 months ago
- ☆290Updated 7 months ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆221Updated 2 years ago
- Find CVE PoCs on GitHub☆144Updated last year
- Cloud-related research releases from the Rhino Security Labs team.☆382Updated 4 years ago
- CVE-2022-0185☆368Updated 2 years ago
- ☆110Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆235Updated this week
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- Kubernetes exploitation tool☆361Updated 8 months ago
- ☆168Updated 2 years ago
- Threatest is a CLI and Go framework for end-to-end testing threat detection rules.☆328Updated last year
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆414Updated last month
- NoSql Injection CLI tool, for finding vulnerable websites using MongoDB.☆374Updated 3 years ago
- Source Code Management Attack Toolkit☆214Updated 2 years ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆249Updated 4 months ago