ThreatResponse / poor-webhookLinks
An example of a vulnerable slack bot that runs in AWS lambda.
☆19Updated 8 years ago
Alternatives and similar repositories for poor-webhook
Users that are interested in poor-webhook are comparing it to the libraries listed below
Sorting:
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- Conference talk slides and code☆11Updated 5 years ago
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆95Updated 2 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 8 years ago
- ☆12Updated 8 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Generate users with "random-ish" realistic passwords or password hashes☆18Updated 9 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Updated 5 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆65Updated 6 years ago
- ☆32Updated 10 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 8 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆46Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Exfiltrate files via DNS☆94Updated 12 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 4 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆60Updated last month
- Tools to automate AWS Cloud security assessments☆24Updated 5 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 7 months ago
- Proof-of-concept program that is able to read and write arbitrary bits using HTTP server-side caching☆38Updated 8 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Network Defender Toolkit☆18Updated 12 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆56Updated 3 years ago
- Golang based web service to scan files with yara rules☆25Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Core incident handling plugins for aws_ir cli, incident pony, and more.☆21Updated 7 years ago