Splinter0 / CrossCheckLinks
A tool to test cross-device authentication protocol security
☆25Updated 11 months ago
Alternatives and similar repositories for CrossCheck
Users that are interested in CrossCheck are comparing it to the libraries listed below
Sorting:
- An Evil OIDC Server☆54Updated 3 years ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆27Updated last year
- ☆94Updated last month
- ☆116Updated 2 years ago
- OAuth 2.0 exploitation, attack and research tools.☆12Updated 2 years ago
- boostsecurityio/lotp☆137Updated last week
- A detailed repository of vulnerabilities that I discovered in The Squid Caching Proxy.☆23Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆114Updated 2 years ago
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- A collection of my Semgrep rules☆51Updated 2 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆141Updated 3 months ago
- HASH (HTTP Agnostic Software Honeypot)☆141Updated last year
- ☆60Updated 2 years ago
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 months ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- Dumps Salesforce objects if provided with credentials.☆25Updated 6 months ago
- Tools to assess DNS security.☆153Updated last year
- Interactive results explorer and annotation tool for Nosey Parker☆47Updated 7 months ago
- Burp Suite extension for testing Passkey systems.☆75Updated 10 months ago
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Updated 2 years ago
- Documentation of Semgrep: a fast, open-source, static analysis tool.☆48Updated last week
- ☆51Updated last year
- A quick reference for understanding the nature and severity of vulnerabilities in TLS configurations and implementations.☆29Updated 5 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆45Updated 7 months ago
- DEbian Cve REproducer Tool☆27Updated 3 weeks ago
- A curated list of argument injection vectors☆41Updated last year
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago