nccgroup / ccs
β110Updated last year
Alternatives and similar repositories for ccs:
Users that are interested in ccs are comparing it to the libraries listed below
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ104Updated 3 months ago
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β133Updated last month
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β117Updated last year
- boostsecurityio/lotpβ123Updated 3 weeks ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β41Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ58Updated last year
- β47Updated 10 months ago
- Protect against subdomain takeoverβ92Updated 11 months ago
- β57Updated last year
- ποΈ STRIDE vs. ASVS equivalence tableβ76Updated 8 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β107Updated 5 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpointsβ114Updated last year
- HASH (HTTP Agnostic Software Honeypot)β140Updated last year
- openrisk is a tool that generates a risk score based on the results of a Nuclei scan.β168Updated 3 months ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ218Updated 2 weeks ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ139Updated 3 years ago
- Nuclei plugins to audit Chrome extensionsβ64Updated 9 months ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ64Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β60Updated 5 months ago
- Blogpost series showcasing interesting cloud - web app security bugsβ47Updated last year
- Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.β166Updated 6 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interestingβ¦β46Updated 8 months ago
- Scan DockerHub images that match a keyword to find secrets.β57Updated 4 years ago
- Tools to assess DNS security.β152Updated last year
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.β91Updated last year
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.β101Updated last year
- Determine privileges from cloud credentials via brute-force testing.β67Updated 8 months ago
- Manager of third-party sources of Semgrep rules πβ81Updated 9 months ago
- β114Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ103Updated last year