ThreatResponse / poor-webhookLinks
An example of a vulnerable slack bot that runs in AWS lambda.
☆19Updated 8 years ago
Alternatives and similar repositories for poor-webhook
Users that are interested in poor-webhook are comparing it to the libraries listed below
Sorting:
- An SSRF-preventing wrapper around Python's requests library. Advocate is no longer maintained, please fork and rename if you would like t…☆95Updated last year
- Conference talk slides and code☆11Updated 5 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- A Heroku-based web honeypot that can be used to create and monitor fake HTTP endpoints (i.e. honeytokens).☆64Updated 6 years ago
- ☆12Updated 8 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 6 years ago
- ☆25Updated 4 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 4 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Checklist and tools for increasing security of Apache Airflow☆32Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Updated 2 months ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago
- Tools to automate AWS Cloud security assessments☆25Updated 5 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 6 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Ansible scripts to build an attack box☆23Updated 6 years ago
- This repository contains hit lists to use for web application content discovery.☆11Updated 8 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago