NeuronAddict / keycloak-scanner
Keycloak security scanner
☆51Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for keycloak-scanner
- Scan DockerHub images that match a keyword to find secrets.☆54Updated 3 years ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆53Updated 2 months ago
- ☆22Updated 2 years ago
- LDAP Swiss Army Knife☆43Updated 11 months ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- ☆17Updated 2 years ago
- This Repository contains the stable beta preview of the next major secureCodeBox (SCB) release v2.0.0.☆24Updated 4 years ago
- A simple remote scanner for Liferay Portal☆18Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 11 months ago
- Damn Vulnerable Java (EE) Application☆130Updated 10 months ago
- My collection of Semgrep rules for vulnerability detection on source code (swift, java)☆32Updated 8 months ago
- OAuth 2.0 Dynamic Security Scanner☆31Updated 3 years ago
- An Evil OIDC Server☆51Updated 2 years ago
- JWT Attack to change the algorithm RS256 to HS256☆32Updated last year
- Assorted tools for security-related task for git repositories☆59Updated 2 years ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆18Updated last month
- ☆40Updated last month
- Monitoring GitHub for sensitive data shared publicly☆66Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆71Updated 9 months ago
- A simple remote scanner for Atlassian Jira☆118Updated last year
- Privilege escalation in Docker☆30Updated 2 years ago
- A recon tool that uses ML to predict subdomains. Then returns those that resolve.☆38Updated last week
- A curated list of argument injection vectors☆37Updated 3 months ago
- Kubernetes Pwnage for all☆54Updated 4 years ago
- ZAP Management Scripts☆21Updated 2 weeks ago
- Dependency Confusion Security Testing Tool☆39Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆98Updated 9 months ago
- ☆78Updated 6 months ago