tenable / hidden-services-revealer
☆28Updated 3 months ago
Related projects ⓘ
Alternatives and complementary repositories for hidden-services-revealer
- A PoC to Simulate Ransomware Attack on AWS Environment☆27Updated last month
- Tool for obfuscating and deobfuscating data.☆64Updated 8 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆39Updated 3 months ago
- ☆24Updated 2 weeks ago
- Independently deploy customized honeyservices in AWS to trigger alerts on unauthorized access. It utilizes a dedicated CloudTrail for pre…☆44Updated this week
- A GitHub Actions Supply Chain CTF / Goat☆17Updated 5 months ago
- Security tool against dependency typosquatting attacks☆34Updated this week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆87Updated last week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆57Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated last month
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆104Updated 2 months ago
- ☆23Updated 2 weeks ago
- ☆55Updated last year
- ☆40Updated 5 months ago
- ☆58Updated last year
- A tool to uncover undocumented APIs from the AWS Console.☆83Updated 2 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.☆64Updated 2 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 2 years ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆37Updated last year
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated 10 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆45Updated 2 months ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆59Updated 8 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆21Updated 2 months ago
- WAF bypass PoC☆43Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆71Updated 9 months ago
- Blogpost series showcasing interesting cloud - web app security bugs☆46Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated last year
- A meta-database collecting resources that compile lists of breaches☆18Updated 2 weeks ago
- ☆17Updated 3 weeks ago