nccgroup / ccsLinks
β114Updated 2 years ago
Alternatives and similar repositories for ccs
Users that are interested in ccs are comparing it to the libraries listed below
Sorting:
- Create notes during a security code review in VSCode π Import your favorite SAST tool findings π οΈ and collaborate with others π€β140Updated 2 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagramsβ106Updated 11 months ago
- truffleproc β hunt secrets in process memory (TruffleHog & gdb mashup)β120Updated 2 years ago
- boostsecurityio/lotpβ137Updated 2 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β42Updated 2 years ago
- Blogpost series showcasing interesting cloud - web app security bugsβ50Updated 2 years ago
- Tools to assess DNS security.β153Updated last year
- Protect against subdomain takeoverβ95Updated 5 months ago
- GCP GOAT is the vulnerable application for learn the GCP Securityβ70Updated 7 months ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalationβ110Updated last year
- β50Updated last year
- β60Updated 2 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interestingβ¦β47Updated last year
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive filesβ228Updated last month
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRFβ59Updated 2 years ago
- Scan DockerHub images that match a keyword to find secrets.β61Updated 4 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raiderβ139Updated 4 years ago
- β193Updated 8 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where wβ¦β113Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.β61Updated last year
- Nuclei plugins to audit Chrome extensionsβ65Updated last year
- LLM Testing Findings Templatesβ75Updated last year
- Manager of 14 third-party sources comprising approximately 4,000 Semgrep rules πβ92Updated 2 weeks ago
- β39Updated last year
- β55Updated 2 years ago
- ποΈ equivalence table between OWASP ASVS standard and STRIDE threat modeling methodology.β75Updated last year
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.β184Updated 3 months ago
- An AWS IAM Privilege Escalation Path Libraryβ88Updated 3 weeks ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpointsβ122Updated 5 months ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/β51Updated last year