NotSoSecure / cloud-sec-wikiLinks
Jekyll Files for cloudsecwiki.com
☆49Updated 4 years ago
Alternatives and similar repositories for cloud-sec-wiki
Users that are interested in cloud-sec-wiki are comparing it to the libraries listed below
Sorting:
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Burp Extension for AWS Signing☆89Updated 8 months ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- ☆36Updated 5 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- ☆44Updated 5 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆121Updated 5 years ago
- ☆148Updated 3 years ago
- learning case to prepare OSWE☆37Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- DupeKeyInjector☆135Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- ☆25Updated last year
- ☆126Updated last year
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- ☆10Updated 6 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆37Updated 7 years ago
- Scans tcl for command injection☆36Updated 6 years ago
- ☆32Updated 6 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆76Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- AWS Security Checks☆40Updated 7 years ago
- BURP extension to record every HTTP request send via BURP and create an audit trail log of an assessment.☆66Updated 5 months ago