A very vulnerable serverless application in AWS Lambda
☆98Oct 7, 2019Updated 6 years ago
Alternatives and similar repositories for lambhack
Users that are interested in lambhack are comparing it to the libraries listed below
Sorting:
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- ☆21Sep 25, 2018Updated 7 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- ☆14Apr 23, 2019Updated 6 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- ☆27Feb 19, 2026Updated last week
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Mar 1, 2019Updated 7 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- ☆26Sep 29, 2018Updated 7 years ago
- ☆20Oct 19, 2018Updated 7 years ago
- OWASP ServerlessGoat: a serverless application demonstrating common serverless security flaws☆328Jul 30, 2024Updated last year
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Jun 26, 2020Updated 5 years ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Damn Vulnerable Cloud Application☆208Sep 12, 2018Updated 7 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Mar 27, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆109Sep 26, 2017Updated 8 years ago
- ☆20Jun 16, 2019Updated 6 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- Hardens Windows Server to CIS Standards☆40May 2, 2019Updated 6 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Jan 27, 2020Updated 6 years ago
- A collection of AWS penetration testing junk☆1,220Aug 30, 2023Updated 2 years ago
- Exploits backed up from http://1337day.com in the 2011☆20Jan 27, 2021Updated 5 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Oct 19, 2017Updated 8 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- Enumeration and reconnaissance activities in the Microsoft Azure Cloud.☆254Feb 20, 2019Updated 7 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Nov 12, 2024Updated last year
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- CVE database☆21Sep 2, 2020Updated 5 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago