pushsecurity/saas-attacks
Offensive security drives defensive security. We're sharing a collection of SaaS attack techniques to help defenders understand the threats they face. #nolockdown
CC-BY-4.0
Issues
- 0
Add cross-idp impersonation as a technique
#84 opened by jukelennings - 0
Add Holehe as recon tool
#82 opened by jacques- - 0
Make a contribution guide
#39 opened by jukelennings - 0
Reconsider not publishing to Mitre ATT&CK
#80 opened by xg5-simon - 0
- 1
- 1
- 0
Add MFA downgrade attack as a technique
#67 opened by jukelennings - 0
Add initial access phase for ghost logins
#72 opened by jukelennings - 0
Add session theft as a technique
#70 opened by jukelennings - 0
Add example for in-app phishing of GitHub using trick to host files on GitHub repos you do not control
#65 opened by jukelennings - 0
Add breach table to list real-world breaches where SaaS attack techniques have been used
#63 opened by jukelennings - 0
Device Enrollment technique
#61 opened by jukelennings - 0
Add AITM phishing proxying as a techinique
#43 opened by jukelennings - 0
- 0
- 0
- 0
- 0
Add okta swa example for password scraping
#51 opened by jukelennings - 0
Add inbound federation as a new technique
#48 opened by jukelennings - 0
- 0
GitHub VSCode OAuth app spoofing
#44 opened by jukelennings - 1
Hosting phishing pages on SaaS (AMP)
#24 opened by jacques- - 0
Add references for shadow workflow + evil twin integration attack chain blog
#40 opened by jukelennings - 0
- 0
Add SAMLjacking example for datadog
#28 opened by jukelennings - 0
Should SAMLJacking be lateral movement as well?
#31 opened by jacques- - 1
- 0
- 0
- 3
Expensify example for ghost logins
#22 opened by jukelennings - 0
Potential new technique - delegated access
#26 opened by jukelennings - 0
Add nuclino example to poisoned tenant
#21 opened by jukelennings - 0
Add MITRE reference links where relevant
#17 opened by jukelennings - 0
Big expansion on recon technique examples
#19 opened by jukelennings - 0
Reference adding sweep
#18 opened by jukelennings - 1
add information and references around device code phishing to consent phishing
#7 opened by jukelennings - 0
reference evilnginx in relevant techniques
#11 opened by jukelennings - 0
- 0
references for tools to do mail rules
#1 opened by jacques-