NotSoSecure / cloud-sec-wikiLinks
Jekyll Files for cloudsecwiki.com
☆49Updated 4 years ago
Alternatives and similar repositories for cloud-sec-wiki
Users that are interested in cloud-sec-wiki are comparing it to the libraries listed below
Sorting:
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- Burp Extension for AWS Signing☆90Updated last year
- Manual JavaScript Linting is a Bug☆48Updated 4 years ago
- ☆36Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Updated 6 years ago
- learning case to prepare OSWE☆37Updated 6 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Updated 6 years ago
- Static code analysis tool based on Elasticsearch☆130Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- AWS Security Checks☆40Updated 7 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆39Updated 7 years ago
- ☆22Updated 3 years ago
- ☆127Updated last year
- ☆90Updated 3 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- ☆148Updated 3 years ago
- ☆32Updated 6 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆122Updated 6 years ago
- ☆10Updated 7 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago