we45 / Serverless-Workshop
Serverless Workshop
☆16Updated 2 years ago
Alternatives and similar repositories for Serverless-Workshop:
Users that are interested in Serverless-Workshop are comparing it to the libraries listed below
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Manual JavaScript Linting is a Bug☆49Updated 4 years ago
- ☆10Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 3 years ago
- A CLI tool to interact with hackerone.com. This was my submission for HackerOne's Summer 2018 Hack Day.☆38Updated 6 years ago
- ☆32Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- OAuth Security Cheatsheet☆39Updated 10 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- ☆22Updated 2 years ago
- Burp Extension for AWS Signing☆88Updated 3 months ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆22Updated 5 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- This burpsuite extender provides a solution on testing Enterprise applications that involve security Authorization tokens into every HTTP…☆46Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- A tool to evaluate Content Security Policies.☆70Updated 4 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆42Updated 8 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- ☆28Updated 8 years ago
- Provides a suite of Burp extensions and a maven plugin to automate security tests using BurpSuite.☆25Updated 6 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago