trufflesecurity / WhoAmISlack
Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.
☆40Updated last year
Alternatives and similar repositories for WhoAmISlack:
Users that are interested in WhoAmISlack are comparing it to the libraries listed below
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆17Updated 2 years ago
- ☆45Updated 9 months ago
- ☆57Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 7 months ago
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆46Updated 7 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆30Updated 5 months ago
- ☆110Updated last year
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆104Updated 4 months ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆22Updated last month
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated last year
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆36Updated 6 months ago
- ☆34Updated 8 months ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- Semgrep-based Policy Controller for Kubernetes☆47Updated last week
- Do bulk whois lookups and get alerted on domains of interest.☆34Updated 8 months ago
- WAF bypass PoC☆47Updated last year
- Additional active scan checks for BURP☆26Updated 6 months ago
- ☆55Updated last year
- ☆62Updated 3 months ago
- PESD (Proxy Enriched Sequence Diagrams) Exporter converts Burp Suite's proxy traffic into interactive diagrams☆103Updated 2 months ago
- Unauthenticated enumeration of AWS IAM Roles.☆23Updated 3 months ago
- A GitHub Actions Supply Chain CTF / Goat☆17Updated 2 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆39Updated last year
- An Evil OIDC Server☆53Updated 2 years ago
- yataf extracts secrets and paths from files or urls - its best used against javascript files☆52Updated 7 months ago
- FrogPost: postMessage Security Testing Tool☆34Updated this week
- This terraform provider can be used to get remote code execution by injecting a dummy resource in a writeable state file.☆53Updated 2 months ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆101Updated last year