RandoriDev / test-saml-idpLinks
☆30Updated 4 years ago
Alternatives and similar repositories for test-saml-idp
Users that are interested in test-saml-idp are comparing it to the libraries listed below
Sorting:
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- A Platform for Testing Secure Coding/Config☆19Updated 6 years ago
- This repository shows the prompts we used for each agent in CVE-Genie☆21Updated 3 months ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆77Updated 5 years ago
- Presentations, training modules, and other education materials from Duo Security's Application Security team.☆77Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- ☆33Updated 10 years ago
- ☆74Updated 4 years ago
- Use Markov Chains to obfuscate data as other data☆54Updated 9 years ago
- Vendor Security Model Contract☆98Updated 3 years ago
- Externalize Java application access to protected resources as log messages.☆43Updated last month
- WStalker: an easy proxy☆25Updated 5 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- ☆28Updated 5 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Code Review Audit Script Scanner☆141Updated 4 months ago
- ☆57Updated 5 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- A framework to generate unique test cases based on code snippets to test techniques☆55Updated 4 years ago
- egrets monitors egress☆46Updated 5 years ago
- Updated incident response generator for training classes☆44Updated 4 years ago
- ☆45Updated 3 years ago
- Proof of concept for an anti-phishing browser plugin, working by comparing pages screenshots with perceptual hashing algorithms.☆11Updated 3 years ago