A very vulnerable serverless application in AWS Lambda
☆98Oct 7, 2019Updated 6 years ago
Alternatives and similar repositories for lambhack
Users that are interested in lambhack are comparing it to the libraries listed below
Sorting:
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Contextual Deserialization vulnerability that causes RCE - Remote Code Execution☆14Apr 28, 2024Updated last year
- This is an offensive guide to securing AWS infrastructures. The hope is that by knowing how to take advantage of various types of AWS wea…☆174Mar 1, 2019Updated 7 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Jun 26, 2020Updated 5 years ago
- A platform to create, catalog and deploy tests for tools such as Gauntlt, AttackIQ and Metasploit.☆17Jul 22, 2016Updated 9 years ago
- Go command line app to exploit file upload vulnerability☆12Feb 8, 2017Updated 9 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- This repository contains all the talk materials and ebook from the talk System Hardening Using Ansible given at All Day DevOps 2016 onlin…☆12Nov 16, 2016Updated 9 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- ☆21Sep 25, 2018Updated 7 years ago
- ☆13Dec 8, 2022Updated 3 years ago
- Dependency Combobulator☆95Jan 10, 2024Updated 2 years ago
- ☆27Feb 19, 2026Updated last month
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Application Security Automation☆527Sep 5, 2023Updated 2 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Dec 7, 2016Updated 9 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- XXE vulnerability demo☆22Jun 1, 2014Updated 11 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Damn Vulnerable Cloud Application☆209Sep 12, 2018Updated 7 years ago
- ☆17Oct 8, 2025Updated 5 months ago
- A collection of AWS penetration testing junk☆1,221Aug 30, 2023Updated 2 years ago
- Jenkins Continuous Integration server for Python projects, using Vagrant☆27Jan 31, 2015Updated 11 years ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- ☆20Oct 19, 2018Updated 7 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Jekyll Files for cloudsecwiki.com☆49Sep 16, 2021Updated 4 years ago
- AWS Inventory and Compliance Framework☆224Jul 12, 2023Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆114Jan 27, 2020Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Sep 25, 2017Updated 8 years ago
- Blazing CloudTrail since 2018☆138Jan 27, 2019Updated 7 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- AWS Live Response☆11Sep 19, 2017Updated 8 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Nov 12, 2024Updated last year
- A set of additional PHPStan rules used in Oro products.☆13Feb 2, 2026Updated last month
- Git plugin that prevents sensitive data from being committed.☆315Oct 8, 2020Updated 5 years ago
- Export / Import your AWS Organizational Structure and Policies - Attach & Validate your SCPs☆26Oct 11, 2023Updated 2 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Jan 1, 2021Updated 5 years ago