DataDog / security-labs-pocs
Proof of concept code for Datadog Security Labs referenced exploits.
☆419Updated last year
Alternatives and similar repositories for security-labs-pocs:
Users that are interested in security-labs-pocs are comparing it to the libraries listed below
- ☆176Updated last month
- ☆557Updated 3 years ago
- ☆293Updated 4 months ago
- Tools to assess DNS security.☆148Updated 9 months ago
- S3 Account Search☆249Updated 2 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆252Updated 5 months ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆350Updated 7 months ago
- Playing around with Stratus Red Team (Cloud Attack simulation tool) and SumoLogic☆282Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆169Updated last month
- ☆237Updated 5 months ago
- Black box fuzzer for web applications☆411Updated 5 months ago
- Grammar-based HTTP/1 fuzzer with mutation ability☆244Updated last month
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆185Updated 2 weeks ago
- Find CVE PoCs on GitHub☆139Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆183Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆358Updated 4 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆281Updated 2 years ago
- A curated list of awesome browser security learning material.☆133Updated 2 years ago
- ☆240Updated 5 months ago
- Nebula is a cloud C2 Framework, which at the moment offers reconnaissance, enumeration, exploitation, post exploitation on AWS, but still…☆405Updated last month
- ☆402Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆481Updated 10 months ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆208Updated last month
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆131Updated last year
- Purposely vulnerable Java application to help lead secure coding workshops☆173Updated 5 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated 10 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆212Updated 3 months ago
- Offensive security and Penetration Testing TTP for Cloud based environment (AWS / Azure / GCP)☆319Updated last month
- Damn Vulnerable Cloud Application☆188Updated 6 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆259Updated 3 weeks ago