snyk-labs / awesome-log4shell
An Awesome List of Log4Shell resources to help you stay informed and secure! 🔒
☆227Updated 2 years ago
Alternatives and similar repositories for awesome-log4shell:
Users that are interested in awesome-log4shell are comparing it to the libraries listed below
- ☆557Updated 3 years ago
- Awesome resources about Security in Kubernetes☆41Updated 2 years ago
- oauth security guidelines☆222Updated 5 years ago
- ☆124Updated 7 months ago
- Purposely vulnerable Java application to help lead secure coding workshops☆177Updated 7 months ago
- Proof of concept code for Datadog Security Labs referenced exploits.☆422Updated last year
- Hashes for vulnerable LOG4J versions☆153Updated 3 years ago
- DEPRECATED, please use the new repository from OWASP: https://github.com/OWASP/raider☆138Updated 3 years ago
- A deliberately vulnerable Kubernetes cluster☆121Updated last year
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆151Updated 10 months ago
- Damn Vulnerable Java (EE) Application☆134Updated last year
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆110Updated 4 years ago
- ☆241Updated 7 months ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆267Updated last year
- Discover vulnerabilities and container image misconfiguration in production environments.☆54Updated last week
- Weaponizing Live CT logs for automated monitoring of assets☆132Updated 3 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆319Updated this week
- Cloud agnostic IAM permissions enumerator☆140Updated 5 months ago
- automated web assets enumeration & scanning [DEPRECATED]☆287Updated last year
- ☆404Updated 2 years ago
- 🧮 An online calculator to assess the risk of web vulnerabilities based on OWASP Risk Assessment☆156Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- An organizational asset and vulnerability management tool, with Jira integration, designed for generating application security reports.☆178Updated 3 months ago
- Curated list of open-source & paid Attack Surface Monitoring (ASM) tools.☆373Updated 4 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆169Updated 3 months ago
- Damn Vulnerable Cloud Application☆191Updated 6 years ago
- ☆133Updated last year
- A utility to convert your AWS CLI credentials into AWS console access.☆231Updated 4 years ago
- This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.☆222Updated 2 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 3 years ago