Splinter0 / CrossCheckLinks
A tool to test cross-device authentication protocol security
☆25Updated 10 months ago
Alternatives and similar repositories for CrossCheck
Users that are interested in CrossCheck are comparing it to the libraries listed below
Sorting:
- Examine Chrome extensions for security issues☆90Updated last month
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆116Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆42Updated 6 months ago
- Detect public repository dependencies in the GitHub repositories with an orphan required library.☆21Updated 6 months ago
- ☆60Updated 2 years ago
- ☆93Updated last week
- DEbian Cve REproducer Tool☆27Updated 2 weeks ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆29Updated last year
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Updated 4 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆79Updated 6 months ago
- Qemuno Framework☆24Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Updated 2 years ago
- ☆82Updated last month
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆47Updated 2 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆66Updated last year
- ☆50Updated last year
- Provides an overview of the inner file structure of a PDF☆25Updated 3 years ago
- Listener that spawns a new tmux window for each incoming reverse shell + Supports listening on many ports☆59Updated 5 months ago
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆77Updated 3 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Tools for attacking Azure Function Apps☆87Updated last month
- Damn Vulnerable CICS Application☆29Updated last year
- ☆94Updated 3 years ago
- Interactive results explorer and annotation tool for Nosey Parker☆44Updated 5 months ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 3 years ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- Burp Suite extension for testing Passkey systems.☆75Updated 8 months ago
- ☆18Updated last year