bcdannyboy / EnterpriseSASTDASTProductLandscapeLinks
Analysis of the Enterprise SAST/DAST product landscape
☆37Updated last year
Alternatives and similar repositories for EnterpriseSASTDASTProductLandscape
Users that are interested in EnterpriseSASTDASTProductLandscape are comparing it to the libraries listed below
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 11 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- ☆35Updated 5 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 2 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- ☆39Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- ☆50Updated last year
- ☆55Updated 2 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆35Updated 10 months ago
- The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆28Updated 3 months ago
- ☆116Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- Some of my rough notes for Docker threat detection☆47Updated 2 years ago
- Dont Gamble with Risk☆14Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
- ☆128Updated 2 months ago
- ☆23Updated last year
- Data about all known supply-chain attacks through history☆60Updated 4 months ago
- AWS SSO serverless phishing API.☆32Updated 4 years ago
- Scan your account for the use of untrusted AMIs☆29Updated last month
- Examine Chrome extensions for security issues☆85Updated 2 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆113Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆24Updated last week
- A not-curated list of cloud hacking labs☆27Updated last year
- InfoSec OpenAI Examples☆19Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago