magoo / ato-checklist
A checklist of practices for organizations dealing with account takeover (ATO)
☆268Updated 6 months ago
Alternatives and similar repositories for ato-checklist:
Users that are interested in ato-checklist are comparing it to the libraries listed below
- Segment's Threat Modeling training for our engineers☆243Updated 3 years ago
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆204Updated 5 months ago
- Find cloud assets that no one wants exposed 🔎 ☁️☆341Updated 4 years ago
- OWASP Domain Protect - prevent subdomain takeover☆398Updated 4 months ago
- ☆123Updated last year
- Eliminate dangling elastic IPs by performing analysis on your resources within all your AWS accounts.☆271Updated 7 months ago
- Monitor the internet attack surface of various public cloud environments. Currently supports AWS, GCP, Azure, DigitalOcean and Oracle Clo…☆124Updated last year
- These are the regexes that power truffleHog☆218Updated 2 years ago
- The Security Champion Framework provides both a measuring stick and a roadmap generator for Champion Programs.☆107Updated last year
- ☆32Updated 4 years ago
- Monitors Github for leaked secrets☆198Updated 6 months ago
- Some good resources for getting started with application security☆142Updated 3 years ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- Search exposed EBS volumes for secrets☆297Updated 2 years ago
- S3 Account Search☆4Updated 6 months ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆384Updated 5 years ago
- A Continuous Threat Modeling methodology☆318Updated 2 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆122Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- This is a companion to the Security Engineer Questions☆201Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 3 years ago
- Unauthenticated enumeration of AWS, Azure, and GCP Principals☆224Updated 5 months ago
- An open source intelligence tool to crawl the graph of certificate Alternate Names☆350Updated last year
- Open source security career ladders☆115Updated 2 years ago
- A collection of response templates for invalid bug bounty reports.☆91Updated 7 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆189Updated 3 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- A tool for identifying misconfigured CloudFront domains☆354Updated 4 years ago
- materials we hand out☆143Updated 3 weeks ago