doyensec / oidc-ssrfLinks
An Evil OIDC Server
☆54Updated 3 years ago
Alternatives and similar repositories for oidc-ssrf
Users that are interested in oidc-ssrf are comparing it to the libraries listed below
Sorting:
- ☆60Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- ☆90Updated 4 years ago
- ☆51Updated last year
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Burp Extension for AWS Signing☆90Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Updated 2 years ago
- ☆15Updated 3 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆42Updated 3 years ago
- ☆94Updated 3 years ago
- UUID issues for Burp Suite☆53Updated 3 years ago
- ☆20Updated 2 years ago
- ☆116Updated 2 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆13Updated 5 months ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 6 months ago
- ☆10Updated 7 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- ☆35Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Updated 6 years ago
- Find what egress ports are allowed☆46Updated 2 months ago
- ☆54Updated 4 years ago