boostsecurityio / lotp
boostsecurityio/lotp
β112Updated this week
Alternatives and similar repositories for lotp:
Users that are interested in lotp are comparing it to the libraries listed below
- β163Updated 6 months ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β132Updated this week
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β114Updated last year
- β110Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ103Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β40Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently β¦β272Updated last month
- Octoscan is a static vulnerability scanner for GitHub action workflows.β196Updated last month
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ58Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interestingβ¦β47Updated 6 months ago
- Semgrep-based Policy Controller for Kubernetesβ47Updated this week
- HASH (HTTP Agnostic Software Honeypot)β137Updated 10 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.β101Updated last year
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessmentsβ138Updated 2 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accountsβ60Updated last year
- Protect against subdomain takeoverβ93Updated 9 months ago
- β59Updated 2 months ago
- β42Updated 9 months ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbiβ¦β233Updated this week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β103Updated 4 months ago
- Manager of third-party sources of Semgrep rules πβ79Updated 7 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ101Updated last month
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.β52Updated last month
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ216Updated 2 weeks ago
- ποΈ STRIDE vs. ASVS equivalence tableβ75Updated 6 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CKβ¦β164Updated 5 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β60Updated 4 months ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobsβ36Updated 5 months ago
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation oβ¦β91Updated last year