Blogpost series showcasing interesting cloud - web app security bugs
☆48Jun 13, 2023Updated 2 years ago
Alternatives and similar repositories for cloudsec-tidbits
Users that are interested in cloudsec-tidbits are comparing it to the libraries listed below
Sorting:
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆19Feb 8, 2023Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆107Jan 30, 2025Updated last year
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 3 months ago
- Proof-of-Concept to evade auditd by writing /proc/PID/mem☆24Aug 21, 2023Updated 2 years ago
- An Evil OIDC Server☆53Oct 19, 2022Updated 3 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- Holds the public Hacking the Cloud CTFs.☆63Feb 28, 2024Updated 2 years ago
- ☆31Oct 28, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆22Jun 20, 2025Updated 9 months ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- Some payloads of JNDI Injection in JDK 1.8.0_191+☆10Mar 24, 2020Updated 5 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆284Nov 27, 2025Updated 3 months ago
- Takes a software bill of materials and outputs provenance, and activity data from trustypkg.dev☆10May 19, 2025Updated 10 months ago
- A Python implementation of dafthack's MSOLSpray. A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if …☆95Jun 6, 2024Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆121Jul 13, 2025Updated 8 months ago
- TrailAlerts is a AWS-native, serverless cloud-detection tool that lets you define simple rules as code and get rich alerts about events i…☆51Nov 9, 2025Updated 4 months ago
- Azure Offensive Library☆17Oct 18, 2025Updated 5 months ago
- Reconstruct javascript from a sourcemap in bash☆38Nov 23, 2021Updated 4 years ago
- ☆93Apr 29, 2024Updated last year
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆553Mar 12, 2026Updated last week
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 6 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆19Jun 9, 2023Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆438Feb 16, 2026Updated last month
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Mar 3, 2026Updated 2 weeks ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆380Sep 19, 2025Updated 6 months ago
- Uses InstallUtil.exe to load a compatible executable from a network share.☆12Mar 8, 2016Updated 10 years ago
- Roadmap to become a Linux-Fine☆10Jul 13, 2024Updated last year
- ☆12Apr 21, 2020Updated 5 years ago
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- Driver Attack Platform for Linux☆18Mar 2, 2023Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆17Jan 31, 2024Updated 2 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 6 years ago
- Technical Challenge (Controls Deployment)☆24Nov 28, 2025Updated 3 months ago
- ☆42Nov 15, 2025Updated 4 months ago
- This repository mainly focuses on various techniques, tools, frameworks and approach to perform offensive exploitation of AWS infrastruct…☆12Jun 12, 2019Updated 6 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago