JeffJerseyCow / eviloauthLinks
OAuth 2.0 exploitation, attack and research tools.
☆12Updated 2 years ago
Alternatives and similar repositories for eviloauth
Users that are interested in eviloauth are comparing it to the libraries listed below
Sorting:
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆50Updated 2 years ago
- Enumerate and check domains for Azure tenants☆60Updated 3 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆24Updated 6 years ago
- tool for identifying guest relationships between companies☆102Updated last year
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Tools and Scripts used in CRTP☆12Updated 5 years ago
- Network penetration testing toolset wrapper☆81Updated 3 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆48Updated 6 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆55Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆43Updated 7 months ago
- Generate a report with charts and statistics about cracked passwords in XLSX format☆36Updated last month
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆42Updated 2 years ago
- EGO is a vulnerability scanner developed by chickenpwny at PolitoInc. It was created to provide a platform for hackers to store multiple …☆28Updated last year
- Active DIrectory Lab for Pentesting Practice☆24Updated 3 years ago
- ☆27Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Updated last year
- A not-curated list of cloud hacking labs☆26Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Upload files done during my research.☆168Updated last month
- Some Cheat Sheet for Red Team☆18Updated 3 years ago
- ☆50Updated last year
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated 2 years ago
- ☆54Updated 2 weeks ago
- Verizon Burp Extensions: AI Suite☆141Updated 9 months ago
- ☆25Updated 7 months ago
- moniorg is a tool that leverages crt.sh website to monitor domains of a target☆47Updated 2 years ago