devsecops / defcon-workshopLinks
☆66Updated 7 years ago
Alternatives and similar repositories for defcon-workshop
Users that are interested in defcon-workshop are comparing it to the libraries listed below
Sorting:
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆39Updated 4 years ago
- Metasploit Framework☆25Updated 7 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- AppSecPipeline Specification for DevOps automation.☆40Updated 2 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- A simplified SMB Email Client Attack script used for pentests.☆30Updated 6 years ago
- ☆14Updated 8 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- Testing/collecting some container breakouts☆94Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 4 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆23Updated 8 years ago
- An extensible honeypot framework☆93Updated 2 years ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆63Updated 2 years ago
- Ansible Playbook for setting up Datasploit☆14Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Automated enumeration☆30Updated 4 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Use burp's JS static code analysis on code from your local system.☆42Updated 8 years ago