SirAppSec / bsides-shadow-api
This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me
☆17Updated 6 months ago
Alternatives and similar repositories for bsides-shadow-api:
Users that are interested in bsides-shadow-api are comparing it to the libraries listed below
- ☆33Updated 2 months ago
- ☆55Updated 2 months ago
- Additional active scan checks for BURP☆26Updated 4 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆31Updated last year
- Nuclei plugins to audit Chrome extensions☆63Updated 7 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆119Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆28Updated last month
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- ☆42Updated 8 months ago
- Simple PoC for demonstrating Race Conditions on Websockets☆56Updated last year
- An Incredibly Annoying, Insufferable Authentication Implementation☆30Updated 10 months ago
- ☆73Updated 7 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆52Updated this week
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- ☆20Updated last year
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated 3 weeks ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆25Updated 5 months ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆86Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆66Updated 5 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆51Updated 5 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆102Updated last year
- ☆53Updated last year