lightspin-tech / lightspin-2022-top-7-attack-pathsView external linksLinks
Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a list of the 2022 Top 7 Cloud Attack Paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform.
☆40Aug 8, 2022Updated 3 years ago
Alternatives and similar repositories for lightspin-2022-top-7-attack-paths
Users that are interested in lightspin-2022-top-7-attack-paths are comparing it to the libraries listed below
Sorting:
- ☆17May 29, 2018Updated 7 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- ☆22Nov 3, 2022Updated 3 years ago
- ☆34Sep 19, 2022Updated 3 years ago
- ☆23Apr 21, 2022Updated 3 years ago
- *Unofficial* lgtm.com CLI — Use at your own risk. Also don't add more than 3K projects to "My projects" list.☆13Feb 21, 2022Updated 3 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11May 11, 2022Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Feb 9, 2024Updated 2 years ago
- ☆45May 12, 2025Updated 9 months ago
- ☆17Nov 2, 2022Updated 3 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- 杂 物 收 纳☆15Aug 4, 2023Updated 2 years ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Aug 30, 2021Updated 4 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- Java Agent memory horse scanner combined with Call Graph modus☆65Dec 26, 2022Updated 3 years ago
- Companion repository of the "Dancer in the Dark" paper.☆20Jul 13, 2024Updated last year
- Office 365 and Exchange Enumeration Version 2☆18Jan 30, 2024Updated 2 years ago
- Use java instrument API without JAR file☆47Jun 19, 2022Updated 3 years ago
- Silent Spring: Prototype Pollution Leads to Remote Code Execution in Node.js☆75Jan 21, 2024Updated 2 years ago
- 多组件客户端☆74May 1, 2025Updated 9 months ago
- ☆46Jan 2, 2022Updated 4 years ago
- ☆19Sep 14, 2021Updated 4 years ago
- GoLang package for creating Mythic Payload Types, C2 Profiles, Translation Services, WebHook listeners, and Loggers☆23Dec 15, 2025Updated 2 months ago
- ☆25Mar 11, 2025Updated 11 months ago
- Attempt to connect to and dump all tables within a ServiceNow instance.☆20Jul 4, 2023Updated 2 years ago
- Java agent without file 无文件的Java agent☆82Apr 7, 2022Updated 3 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- Spring Boot Actuator + Spring Cloud Vul Env☆19Dec 25, 2019Updated 6 years ago
- 手把手教你写IAST系列☆24Jan 12, 2024Updated 2 years ago
- log4j-patch 修改字节码实现补丁防御☆20Dec 10, 2021Updated 4 years ago
- A powerful AWS Cognito analysis and session hijacking toolkit designed for security researchers and penetration testers. CognitoHunter sp…☆21Jan 20, 2025Updated last year
- cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件☆93Jan 17, 2023Updated 3 years ago
- A Simple PoC☆22May 24, 2024Updated last year
- 一个普通的BOF用来BypassUAC☆22Apr 6, 2024Updated last year
- We publish our challenge questions for everyone.☆94Mar 15, 2021Updated 4 years ago
- 肾透测试中心 - https://gitbook.se7ensec.cn/☆54Feb 6, 2026Updated last week
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆25Feb 11, 2023Updated 3 years ago