krol3 / demo-fileless
☆12Updated last year
Related projects: ⓘ
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆23Updated 2 months ago
- Determine privileges from cloud credentials via brute-force testing.☆63Updated 3 weeks ago
- ☆39Updated 3 months ago
- ☆19Updated 5 months ago
- WAF bypass PoC☆43Updated 11 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆61Updated 11 months ago
- ☆58Updated last year
- ☆15Updated 2 months ago
- ☆31Updated last year
- ☆12Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆39Updated last year
- Clean accounts over permissions in GCP infra at scale☆70Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆42Updated 8 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆38Updated 9 months ago
- ⚙ DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")☆14Updated 11 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆68Updated 7 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆44Updated last year
- ☆42Updated 3 years ago
- a tool to audit the istio service mesh☆173Updated 2 years ago
- Kubernetes Pwnage for all☆54Updated 3 years ago
- AWS SSO serverless phishing API.☆29Updated 3 years ago
- ☆55Updated last year
- OWASP Foundation Web Respository☆33Updated 2 weeks ago
- Offensive Terraform module which creates EC2 instance and reverse shell from an EC2 instance to attacker machine.☆17Updated 4 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 2 years ago
- ☆163Updated 2 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆15Updated 3 months ago
- PoC for gaining persistency on vulnerable Lambdas☆30Updated 3 years ago
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆56Updated 6 months ago