doyensec / cloudsec-tidbitsLinks
Blogpost series showcasing interesting cloud - web app security bugs
☆49Updated 2 years ago
Alternatives and similar repositories for cloudsec-tidbits
Users that are interested in cloudsec-tidbits are comparing it to the libraries listed below
Sorting:
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- ☆35Updated 2 months ago
- ☆47Updated last year
- This repository hosts several snippets and file related to the BsidesLV 2024 talk about Shadow and Zombie APIs by me☆18Updated 10 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Updated 3 months ago
- ☆57Updated 2 years ago
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆32Updated 3 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 2 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆105Updated 4 months ago
- ☆22Updated 2 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated 8 months ago
- An extension to use Semgrep inside Burp Suite.☆89Updated last month
- An Evil OIDC Server☆53Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 3 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆40Updated 5 months ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 9 months ago
- ☆31Updated 2 months ago
- Enumerate AWS permissions and resources.☆69Updated 3 years ago
- ☆36Updated 10 months ago
- Additional active scan checks for BURP☆27Updated 8 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 9 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13Updated last year
- ☆17Updated 3 years ago
- 📚A curated list of product security resources.☆20Updated last week