ofirc / ingress-nightmareLinks
A Terraform reproducer for IngressNightmare
☆25Updated 8 months ago
Alternatives and similar repositories for ingress-nightmare
Users that are interested in ingress-nightmare are comparing it to the libraries listed below
Sorting:
- CVE-2025-1974☆90Updated 8 months ago
- Tool to spray AWS Console IAM Logins☆34Updated 3 years ago
- ☆50Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- ☆31Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Some of my rough notes for Docker threat detection☆48Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆52Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Scan your account for the use of untrusted AMIs☆30Updated this week
- ☆19Updated last year
- Damn Vulnerable SCA Application☆43Updated last month
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 3 weeks ago
- ☆39Updated last year
- WAF bypass PoC☆49Updated 2 years ago
- ☆82Updated 3 weeks ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year
- ☆94Updated 3 years ago
- Find what egress ports are allowed☆46Updated 3 weeks ago
- PoC for CVE-Requested vulnerability in Amazon ECS (EC2 launch type) allowing cross-task IAM credential theft.☆45Updated 3 months ago
- Create honeypots for cloud environments☆104Updated 2 months ago
- ☆116Updated 2 years ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated last year
- ☆141Updated this week
- A not-curated list of cloud hacking labs☆27Updated last year
- An Evil OIDC Server☆54Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 10 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 4 months ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year