cji / talksLinks
Conference talk slides and code
☆11Updated 5 years ago
Alternatives and similar repositories for talks
Users that are interested in talks are comparing it to the libraries listed below
Sorting:
- Scan for and exploit Consul agents☆40Updated 6 years ago
- ☆67Updated 8 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- badbucket checks your s3 bucket for common misconfigurations☆24Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- ☆25Updated 4 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- ☆12Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- 🔐 A concurrent, command-line AWS S3 Fuzzer. Written in Go.☆45Updated 7 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 5 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆24Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 6 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Updated 10 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- Scripts for AWS amusement...☆21Updated 3 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago