nccgroup / raccoonLinks
Salesforce object access auditor
☆117Updated 2 years ago
Alternatives and similar repositories for raccoon
Users that are interested in raccoon are comparing it to the libraries listed below
Sorting:
- ☆90Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆139Updated 4 years ago
- Scan DockerHub images that match a keyword to find secrets.☆60Updated 4 years ago
- AWS Security Checks☆40Updated 7 years ago
- ☆114Updated 2 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- ☆23Updated 3 years ago
- ☆36Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Updated 3 years ago
- ☆60Updated 2 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 9 months ago
- Burp with Friends☆103Updated 2 years ago
- Application and Service Fingerprinting☆133Updated 2 years ago
- Slackhound allows red and blue teams to perform fast reconnaissance on Slack workspaces/organizations to quickly search user profiles, lo…☆83Updated 3 months ago
- This script is a multi-threaded Okta password sprayer.☆71Updated last year
- GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 5 months ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- Burp Extension for AWS Signing☆89Updated 10 months ago
- Scans Slack for API tokens, credentials, passwords, and more using YARA rules☆40Updated 4 years ago
- ☆139Updated 2 years ago
- ☆126Updated last year
- ☆148Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆77Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated 2 years ago