pomerium / awesome-security-auditsView external linksLinks
A collection of public security audits.
☆208Dec 3, 2019Updated 6 years ago
Alternatives and similar repositories for awesome-security-audits
Users that are interested in awesome-security-audits are comparing it to the libraries listed below
Sorting:
- ☆12Jun 14, 2017Updated 8 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Aug 11, 2021Updated 4 years ago
- Awesome Golang Security resources 🕶🔐☆1,961Jun 5, 2024Updated last year
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Sample vulnerable code and its exploit code☆190Mar 14, 2021Updated 4 years ago
- High performance WordPress login bruteforcer with automatic concurrency for maximum amount of tries per second.☆78Feb 23, 2020Updated 5 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- NebulousAD automated credential auditing tool.☆154Apr 8, 2020Updated 5 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A Unit-Based Symbolic Execution Method for Detecting Memory Corruption Vulnerabilities in Executable Codes☆43May 7, 2023Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Apr 28, 2020Updated 5 years ago
- Automates credential skimming from service accounts in Windows Registry☆78Sep 29, 2020Updated 5 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Jun 26, 2019Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆56Jun 6, 2023Updated 2 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Dec 8, 2022Updated 3 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆122Aug 1, 2022Updated 3 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆675Sep 27, 2023Updated 2 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- A general-purpose write-ahead log☆25Dec 3, 2018Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Jun 24, 2018Updated 7 years ago
- Goca Scanner☆328Oct 11, 2023Updated 2 years ago
- Awesome Firmware Security & Other Helpful Documents☆612Jul 24, 2019Updated 6 years ago
- Go security checker☆8,674Updated this week
- Web app authorisation coverage scanning☆236Mar 6, 2023Updated 2 years ago
- Forwards HTTP requests to multiple endpoints☆10Aug 22, 2017Updated 8 years ago
- JustGetDA, a cheat sheet which will aid you through internal network & red team engagements.☆13Jul 24, 2023Updated 2 years ago
- Materials from Fuzzing Bay Area meetups☆57Dec 23, 2019Updated 6 years ago
- a list of web browser vulnerabilities☆20May 10, 2020Updated 5 years ago
- Everything you need about Burp Extension Generation☆157Jan 6, 2023Updated 3 years ago
- BlueKeep scanner supporting NLA☆167Jul 18, 2019Updated 6 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Nov 26, 2016Updated 9 years ago
- Leverage the ability of Terraform and AWS or GCP to distribute large security scans across numerous cloud instances.☆93Nov 19, 2023Updated 2 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆153Jul 31, 2023Updated 2 years ago
- PoC for CVE-2018-1002105.☆222Dec 21, 2018Updated 7 years ago
- A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.☆924Jul 25, 2019Updated 6 years ago