nccgroup / ccsLinks
β114Updated 2 years ago
Alternatives and similar repositories for ccs
Users that are interested in ccs are comparing it to the libraries listed below
Sorting:
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β140Updated last month
- boostsecurityio/lotpβ141Updated last month
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ106Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β42Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ70Updated 7 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interestingβ¦β47Updated last year
- β60Updated 2 years ago
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β121Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β111Updated last year
- Scan DockerHub images that match a keyword to find secrets.β61Updated 4 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ228Updated last month
- LLM Testing Findings Templatesβ75Updated last year
- Nuclei plugins to audit Chrome extensionsβ65Updated last year
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ139Updated 4 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/β51Updated last year
- Tools to assess DNS security.β153Updated last year
- Protect against subdomain takeoverβ94Updated 5 months ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β61Updated last year
- Blogpost series showcasing interesting cloud - web app security bugsβ50Updated 2 years ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ58Updated 2 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ109Updated last year
- β50Updated last year
- β55Updated 2 years ago
- β90Updated 3 years ago
- Manager of third-party sources of Semgrep rules πβ90Updated last year
- InfoSec OpenAI Examplesβ19Updated 2 years ago
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β75Updated last year
- β139Updated 2 years ago
- β17Updated 3 years ago
- β39Updated last year