tsarpaul / Azure-Functions-EoP-PoC
☆29Updated 4 years ago
Alternatives and similar repositories for Azure-Functions-EoP-PoC:
Users that are interested in Azure-Functions-EoP-PoC are comparing it to the libraries listed below
- Build a phishing server (Gophish) together with SMTP-redirector (Postfix) automatically in Digital Ocean with terraform and ansible..☆19Updated 3 years ago
- Argument Injection in Dragonfly Ruby Gem☆16Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- Ingest openldap data into bloodhound☆78Updated 3 years ago
- ☆24Updated 4 years ago
- ☆36Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆75Updated 4 years ago
- ☆34Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆29Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- ☆10Updated 6 years ago
- This Burpsuite plugin allows for multiple web app testers to share their proxy history with each other in real time. Requests that comes …☆23Updated 4 years ago
- Protect your servers with a secret header☆29Updated 4 years ago
- Red team oriented key finder and correlator☆16Updated last year
- A mirror of several precompiled standalone red-teaming tools.☆18Updated 2 years ago
- CTF Writeups☆26Updated 5 years ago
- OAuth 2.0 Dynamic Security Scanner☆31Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆43Updated 2 years ago
- Spin up RedTeam infrastructure on AWS via Ansible☆60Updated 4 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- ☆103Updated 4 years ago
- A framework for exploiting padding oracles in network-based applications☆26Updated last year
- Hacking Artifactory with server side template injection☆51Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- ☆38Updated 4 years ago