nccgroup / ccs
β110Updated last year
Alternatives and similar repositories for ccs:
Users that are interested in ccs are comparing it to the libraries listed below
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β132Updated last week
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ103Updated 2 months ago
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β115Updated last year
- boostsecurityio/lotpβ121Updated this week
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β40Updated last year
- β57Updated last year
- ποΈ STRIDE vs. ASVS equivalence tableβ76Updated 7 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ58Updated last year
- Protect against subdomain takeoverβ93Updated 10 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β60Updated 5 months ago
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.β165Updated 5 months ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β104Updated 5 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpointsβ113Updated last year
- Tools to assess DNS security.β151Updated last year
- Determine privileges from cloud credentials via brute-force testing.β67Updated 7 months ago
- Nuclei plugins to audit Chrome extensionsβ64Updated 8 months ago
- Manager of third-party sources of Semgrep rules πβ81Updated 8 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ217Updated this week
- β165Updated 7 months ago
- An extension to use Semgrep inside Burp Suite.β88Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.β101Updated last year
- A collection of Turbo Intruder scripts.β57Updated 2 months ago
- β55Updated last year
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.β91Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interestingβ¦β46Updated 7 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find entβ¦β121Updated 2 years ago
- β134Updated 2 years ago
- β114Updated last year
- Scan DockerHub images that match a keyword to find secrets.β55Updated 4 years ago