NotSoSecure / cloud-sec-wikiLinks
Jekyll Files for cloudsecwiki.com
☆50Updated 3 years ago
Alternatives and similar repositories for cloud-sec-wiki
Users that are interested in cloud-sec-wiki are comparing it to the libraries listed below
Sorting:
- Burp Extension for AWS Signing☆89Updated 6 months ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- ☆36Updated 5 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆121Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆77Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- ☆148Updated 3 years ago
- ☆24Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆89Updated 2 years ago
- ☆127Updated last year
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- DupeKeyInjector☆135Updated 3 years ago
- ☆32Updated 6 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆36Updated 7 years ago
- Burp as a Docker Container☆59Updated 4 years ago
- ☆90Updated 3 years ago