doyensec / oidc-ssrfLinks
An Evil OIDC Server
☆54Updated 3 years ago
Alternatives and similar repositories for oidc-ssrf
Users that are interested in oidc-ssrf are comparing it to the libraries listed below
Sorting:
- ☆60Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆42Updated 2 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆24Updated 4 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Updated 2 years ago
- ☆90Updated 3 years ago
- ☆50Updated last year
- ☆15Updated 3 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆58Updated 2 years ago
- C# and Impacket implementation (here with Kerberos auth support) of PrintNightmare CVE-2021-1675/CVE-2021-34527☆29Updated 4 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆20Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- A curated list of argument injection vectors☆41Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆38Updated 3 years ago
- Find what egress ports are allowed☆46Updated 2 months ago
- A steampipe plugin to query projectdiscovery.io tools.☆27Updated last year
- ☆94Updated 3 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆81Updated 5 months ago
- This script gets all accepted domains in Microsoft 365 using autodiscover, gets the tenant name and checks if there is a Microsoft Defend…☆24Updated last year
- A Python-based tool to create zip, tar and cpio archives to exploit common archive library issues and developer mistakes☆43Updated 2 months ago
- Burp Extension for AWS Signing☆90Updated last year
- ☆10Updated 7 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- UUID issues for Burp Suite☆53Updated 3 years ago
- ☆26Updated 3 years ago