nccgroup / ccsLinks
β114Updated 2 years ago
Alternatives and similar repositories for ccs
Users that are interested in ccs are comparing it to the libraries listed below
Sorting:
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β141Updated 2 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ106Updated last year
- boostsecurityio/lotpβ136Updated 3 months ago
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β120Updated 2 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β42Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ70Updated 8 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ59Updated 2 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interestingβ¦β47Updated last year
- β60Updated 2 years ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β113Updated last year
- Protect against subdomain takeoverβ95Updated 6 months ago
- Blogpost series showcasing interesting cloud - web app security bugsβ49Updated 2 years ago
- Tools to assess DNS security.β153Updated last year
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ109Updated last year
- β55Updated 2 years ago
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β61Updated last year
- β39Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ228Updated last week
- β50Updated last year
- β192Updated 9 months ago
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β76Updated last year
- β116Updated 2 years ago
- HASH (HTTP Agnostic Software Honeypot)β141Updated last year
- Nuclei plugins to audit Chrome extensionsβ65Updated last year
- LLM Testing Findings Templatesβ75Updated last year
- β17Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ139Updated 4 years ago
- Scan DockerHub images that match a keyword to find secrets.β61Updated 4 years ago
- An AWS IAM Privilege Escalation Path Libraryβ110Updated 2 weeks ago
- Determine privileges from cloud credentials via brute-force testing.β67Updated last year