abhisek / supply-chain-security-gateway
Reference architecture and proof of concept implementation for supply chain security gateway
☆23Updated last year
Related projects ⓘ
Alternatives and complementary repositories for supply-chain-security-gateway
- An Evil OIDC Server☆51Updated 2 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆45Updated last year
- ☆17Updated 2 years ago
- ☆10Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- ☆58Updated last year
- AWS SSO serverless phishing API.☆29Updated 3 years ago
- ☆13Updated last year
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated last month
- OAuth 2.0 Dynamic Security Scanner☆31Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- python3 scripts to help with aws triage needs☆15Updated 2 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆57Updated last year
- ☆15Updated 9 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 3 months ago
- Pythonize Intruder Payload☆13Updated 3 years ago
- Push notifications to Slack channel or to custom server based on BurpSuite response conditions.☆18Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆10Updated last year
- Jekyll Files for cloudsecwiki.com☆49Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 2 months ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆11Updated 2 years ago
- Reproducible and extensible BloodHound playbooks☆42Updated 4 years ago
- ☆22Updated 2 years ago
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 3 years ago
- ☆90Updated 2 years ago
- Proof-of-concept CORS exploitation tool.☆34Updated 5 years ago
- Go module that returns supported regions for a service or supported services for a region☆15Updated 5 months ago