gitoops: all paths lead to clouds
gitoops GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by abusing CI/CD pipelines and GitHub access controls. It works...
gitoops GitOops is a tool to help attackers and defenders identify lateral movement and privilege escalation paths in GitHub organizations by abusing CI/CD pipelines and GitHub access controls. It works...
Information Gathering / Vulnerability Analysis / Web Information Gathering / Web Vulnerability Analysis
by do son · Published September 28, 2021
dorkscout dokrscout is a tool to automate the finding of vulnerable applications or secret files around the internet through google searches, dorkscout first starts by fetching the dorks lists from...
SubCrawl SubCrawl is a framework developed by Patrick Schläpfer, Josh Stroschein, and Alex Holland of HP Inc’s Threat Research team. SubCrawl is designed to find, scan and analyze open directories. The framework is modular, consisting of...
Programming / Vulnerability Analysis / Web Vulnerability Analysis
by do son · Published September 23, 2021 · Last modified May 1, 2024
shisho Shisho is a lightweight static code analyzer designed for developers and security teams. The key motivation of Shisho is providing a means of Security-as-Code for Code. It allows us to analyze...
by do son · Published September 21, 2021 · Last modified December 6, 2022
crawlergo crawlergo is a browser crawler that uses chrome headless mode for URL collection. It hooks key positions of the whole web page with the DOM rendering stage, automatically fills...
by do son · Published September 14, 2021 · Last modified September 28, 2023
DongTai DongTai IAST is an open-source passive interactive security testing (IAST) product. It uses dynamic hooks and taint tracking algorithms to achieve universal vulnerability detection and multiples request associated with vulnerability detection (including...
Web Information Gathering / Web Vulnerability Analysis
by do son · Published September 11, 2021 · Last modified September 14, 2021
WebStor Fast Identification of Vulnerable Web Technologies in your Organization WebStor is a tool implemented in Python under the MIT license for quickly enumerating all websites across all of your...
JSPanda JSpanda is a client-side prototype pollution vulnerability scanner. It has two key features, scanning vulnerability the supplied URLs and analyzing the JavaScript libraries’ source code. However, JSpanda cannot detect...
DNS Reset Checker Tools to assess the DNS security of web applications. Background DNS security of web applications? What? The DNS is a central part of many functionalities of a...
juumla Juumla is a python tool created to identify the Joomla version, scan for vulnerabilities and search for config or backup files. ✨ Features Fast scan Low RAM and CPU usage...
DNSTake: A fast tool to check missing hosted DNS zones that can lead to subdomain takeover. What is a DNS takeover? DNS takeover vulnerabilities occur when a subdomain (subdomain.example.com) or...
plution Prototype pollution scanner using headless chrome Plution is a convenient way to scan at scale for pages that are vulnerable to client-side prototype pollution via a URL payload. In...
BatchQL BatchQL is a GraphQL security auditing script with a focus on performing batch GraphQL queries and mutations. This script is not complex, and we welcome improvements. When exploring the...
Erebus Erebus is used to test every parameter across targets based on Yaml templates leading to zero false positives and providing fast scanning on a large number of hosts. Erebus...
Programming / Web Vulnerability Analysis
by do son · Published August 27, 2021 · Last modified September 22, 2022
GoKart – Go Security Static Analysis GoKart is a static analysis tool for Go that finds vulnerabilities using the SSA (single static assignment) form of Go source code. It is...