DistriNet / OAuchLinks
OAuch is an open-source security best practices and threats analyzer for OAuth 2.0 authorization server implementations
☆13Updated 2 months ago
Alternatives and similar repositories for OAuch
Users that are interested in OAuch are comparing it to the libraries listed below
Sorting:
- Focused malicious code detection ruleset, with a high protection-to-noise ratio☆127Updated 8 months ago
- Tool for obfuscating and deobfuscating data.☆74Updated last year
- A Python package to download Zone Files from the Centralized Zone Data Service hosted by ICAAN.☆17Updated 4 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 3 months ago
- Scanner to identify dangling DNS records and subdomain takeovers☆49Updated 11 months ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆29Updated last year
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 11 months ago
- ☆114Updated 2 years ago
- Maturity Model Collaborative project☆15Updated 2 years ago
- Global Security Database Tools☆43Updated last year
- The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a…☆17Updated 2 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated last year
- ☆31Updated 4 months ago
- OWASP Top 10 Infrastructure Security Risks☆43Updated 3 weeks ago
- ☆60Updated 2 years ago
- ☆55Updated 2 years ago
- ☆39Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆37Updated 3 weeks ago
- InfoSec OpenAI Examples☆19Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆110Updated 11 months ago
- A security tool that detects malicious packages from external vulnerability feeds and searches for them in your package registries or art…☆64Updated this week
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆67Updated 4 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- An Evil OIDC Server☆54Updated 3 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Updated last year
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆58Updated 9 months ago
- boostsecurityio/lotp☆137Updated 2 weeks ago