SirAppSec / bsides-shadow-api
This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me
☆18Updated 8 months ago
Alternatives and similar repositories for bsides-shadow-api:
Users that are interested in bsides-shadow-api are comparing it to the libraries listed below
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- A collection of Turbo Intruder scripts.☆57Updated 2 months ago
- ☆62Updated 3 months ago
- Additional active scan checks for BURP☆26Updated 6 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- ☆35Updated 2 weeks ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆30Updated last month
- Verizon Burp Extensions: AI Suite☆124Updated 3 weeks ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Nuclei plugins to audit Chrome extensions☆64Updated 9 months ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Updated 11 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- A web security research tool for DOM testing☆20Updated this week
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆45Updated 10 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆38Updated 3 months ago
- ☆75Updated 9 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Updated 3 months ago
- 📚A curated list of product security resources.☆19Updated 2 years ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated 7 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆124Updated last year
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆20Updated 2 months ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 3 weeks ago
- "Terrible Thick Client" is a vulnerable application developed in C# .NET framework.☆20Updated last year
- Tool to query the RIPE database☆11Updated 9 months ago
- A recon tool that uses ML to predict subdomains. Then returns those that resolve.☆62Updated last month
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year