we45 / Serverless-WorkshopLinks
Serverless Workshop
☆16Updated 3 years ago
Alternatives and similar repositories for Serverless-Workshop
Users that are interested in Serverless-Workshop are comparing it to the libraries listed below
Sorting:
- This repo gives an overview of some GCP metadata API attack and defend patterns☆78Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆49Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 8 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Updated 6 years ago
- vulnerable single sign on☆148Updated last year
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆78Updated 3 years ago
- Burp Extension for AWS Signing☆90Updated last year
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆109Updated 6 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- A repository for GraphQL Extension for Burp Suite☆57Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆114Updated 6 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- Manual JavaScript Linting is a Bug☆48Updated 4 years ago
- Takes ip range, Scan all open SSL Certs, Grab Cnames☆113Updated 7 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆34Updated 7 years ago
- ☆12Updated 8 years ago
- This is a web application fuzzer scanner - the goal was CLI flexibility and rapid prototyping☆48Updated 6 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Updated 2 years ago
- Route53/CloudFront Vulnerability Assessment Utility☆87Updated 2 years ago
- Orchestron is an Application Vulnerability Management and Correlation Tool.Orchestron helps you solve one key problem "Find and fix vulne…☆31Updated 3 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 5 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆94Updated last year
- All-in-one AWS S3 bucket tool for pentesters.☆73Updated 6 years ago
- Corsair_scan is a security tool to test Cross-Origin Resource Sharing (CORS).☆123Updated 2 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- DupeKeyInjector☆135Updated 3 years ago