ThreatResponse / poor-webhookLinks
An example of a vulnerable slack bot that runs in AWS lambda.
☆19Updated 7 years ago
Alternatives and similar repositories for poor-webhook
Users that are interested in poor-webhook are comparing it to the libraries listed below
Sorting:
- dev level ;-)☆10Updated 6 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- Conference talk slides and code☆11Updated 4 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Custom slash command to do ipinfo.io lookups from within Slack☆10Updated 9 years ago
- Custom slash command to do a basic dnsrecon from within Slack☆12Updated 9 years ago
- Repository for Security Workshop content☆20Updated 7 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- ☆27Updated 7 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Updated 7 years ago
- A Scaleable and Asynchronous Framework for Testing Tools built on Kubernetes☆34Updated 8 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- first commit☆20Updated last year
- ☆18Updated 2 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Monitor Certificate Transparency Logs For Phishing Domains☆25Updated 6 years ago
- Looks for GitHub org users without 2FA turned on☆9Updated 8 years ago
- ☆9Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- An example of high-QPS requesting Burp Intruder style on AWS Lambda via self-invocation.☆22Updated 6 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago