trufflesecurity / WhoAmISlack
Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.
☆40Updated last year
Alternatives and similar repositories for WhoAmISlack:
Users that are interested in WhoAmISlack are comparing it to the libraries listed below
- ☆43Updated 9 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 6 months ago
- ☆58Updated last year
- Additional active scan checks for BURP☆26Updated 5 months ago
- ☆59Updated 3 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated last week
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- ☆32Updated 7 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆103Updated 4 months ago
- ☆17Updated 2 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆29Updated 2 months ago
- WAF bypass PoC☆46Updated last year
- ☆110Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 5 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Updated 7 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆101Updated last month
- A steampipe plugin to query projectdiscovery.io tools.☆26Updated 7 months ago
- An Evil OIDC Server☆53Updated 2 years ago
- boostsecurityio/lotp☆114Updated this week
- Encode and Fuzz Custom Protobuf Messages in Burp Suite☆31Updated 2 weeks ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 6 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- ☆33Updated 3 months ago
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆60Updated last year
- ☆55Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Updated last week
- A GitHub Actions Supply Chain CTF / Goat☆17Updated last month