bcdannyboy / EnterpriseSASTDASTProductLandscapeLinks
Analysis of the Enterprise SAST/DAST product landscape
☆37Updated last year
Alternatives and similar repositories for EnterpriseSASTDASTProductLandscape
Users that are interested in EnterpriseSASTDASTProductLandscape are comparing it to the libraries listed below
Sorting:
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
 - The Event Maturity Matrix (EMM) is a comprehensive framework that provides clarity regarding the capabilities and nuances of SaaS audit l…☆28Updated 4 months ago
 - HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
 - A not-curated list of cloud hacking labs☆27Updated last year
 - An LLM and OCR based Indicator of Compromise Extraction Tool☆36Updated 10 months ago
 - ☆35Updated 2 weeks ago
 - Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
 - Examine Chrome extensions for security issues☆85Updated 2 months ago
 - POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
 - Providing Azure pipelines to create an infrastructure and run Atomic tests.☆53Updated 2 years ago
 - Dont Gamble with Risk☆14Updated last year
 - This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated last year
 - A tool for folks who `git clone` first and ask questions later☆56Updated last month
 - HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
 - Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
 - ☆18Updated last month
 - A tool for secrets management, encryption as a service, and privileged access management☆14Updated 3 months ago
 - ☆50Updated last year
 - A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆58Updated 2 months ago
 - ☆116Updated 2 years ago
 - ☆129Updated 2 months ago
 - ☆18Updated last year
 - Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated last year
 - Some of my rough notes for Docker threat detection☆48Updated 2 years ago
 - Scan your account for the use of untrusted AMIs☆30Updated 2 months ago
 - Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
 - A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
 - python3 scripts to help with aws triage needs☆15Updated 3 years ago
 - Invictus Threat Intelligence: IOCs and TTPs from blogs, research and more☆29Updated 3 weeks ago
 - WAF bypass PoC☆49Updated 2 years ago