snyk / snyk-code-review-exerciseLinks
Example Code Review Exercise
☆12Updated last month
Alternatives and similar repositories for snyk-code-review-exercise
Users that are interested in snyk-code-review-exercise are comparing it to the libraries listed below
Sorting:
- ☆13Updated last year
- ☆57Updated 2 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- AWS SSO serverless phishing API.☆32Updated 3 years ago
- Collection of Semgrep rules for security analysis☆10Updated last year
- AWS Security Checks☆39Updated 7 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Slide Decks and Supporting Content of talks given for Bugcrowd☆17Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆11Updated 5 months ago
- ☆47Updated 11 months ago
- python3 script that pulls gitlab data of interest using a gitlab personal access token☆13Updated 3 years ago
- ☆36Updated 10 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 9 months ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Updated 4 years ago
- ☆21Updated 7 years ago
- ☆10Updated 6 years ago
- Virtual Security Operations Center☆50Updated last year
- A GitHub Actions Supply Chain CTF / Goat☆20Updated this week
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆14Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆31Updated 7 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- Let's check if your target is vulnerable for client side prototype pollution.☆65Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 2 months ago
- Strategy for building a Red Team☆17Updated last year
- Simple python script for AD enumeration☆31Updated 4 years ago