ofirc / ingress-nightmareLinks
A Terraform reproducer for IngressNightmare
☆25Updated 7 months ago
Alternatives and similar repositories for ingress-nightmare
Users that are interested in ingress-nightmare are comparing it to the libraries listed below
Sorting:
- CVE-2025-1974☆90Updated 7 months ago
- Damn Vulnerable SCA Application☆42Updated last month
- Tool to spray AWS Console IAM Logins☆34Updated 3 years ago
- ☆50Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆50Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- WAF bypass PoC☆49Updated 2 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- Scan your account for the use of untrusted AMIs☆30Updated 2 months ago
- Find what egress ports are allowed☆43Updated 2 years ago
- ☆31Updated 2 years ago
- ☆81Updated this week
- Some of my rough notes for Docker threat detection☆48Updated 2 years ago
- An Evil OIDC Server☆54Updated 3 years ago
- Create honeypots for cloud environments☆103Updated last month
- Citrix Scanner for CVE-2023-3519☆52Updated 2 years ago
- ☆18Updated last year
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 3 years ago
- ☆55Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- An extension to use Semgrep inside Burp Suite.☆89Updated 5 months ago
- ☆94Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Updated last year
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 8 months ago
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆89Updated last year
- First iteration of ML based Feedback WAF☆59Updated last year
- A not-curated list of cloud hacking labs☆27Updated last year
- POC for CVE-2022-23648☆37Updated 3 years ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆106Updated 9 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆43Updated last year