Due to security assessments of different projects, I found different leaked/exposed accounts on the domain of the organization. But every time it was so difficult to discover the place where I can reuse those credentials and how can I expand my attack surface. I started collecting a list of popular technological services which might have high value in case of improper access. This project should help researchers, pentesters, bounty-hunters to expand the risks of compromised accounts in the corporate environment.
Service Name | Trusted login providers |
---|---|
Gitlab | Google, Salesforce, Github, Bitbucket, Twitter |
Travis CI | Github, Bitbucket, Gitlab, Assembla |
Grafana | Google, Github, Microsoft |
Sentry | Google, Github, Azure DevOps |
Slack | |
Raygun | Github, Twitter, Facebook, Google |
Datadog | |
Atlassian | Google, Microsoft, Apple |
Trello | Google, Microsoft, Apple |
Trailblazer | Salesforce |
Bitbucket | Google, Microsoft, Apple |
Elastic Cloud | Google, Microsoft |
Netdata Cloud | Google, Github |
Jetbrains | Bitbucket |
Box | |
Skype | Microsoft |
Dropbox | Google, Apple |
Auth0 | Github, Google, Linkedin, Microsoft |
Miro | Google, Facebook, Slack, Office365, Apple |
Salesforce | - |
GitHub | - |
Eclipse | - |
Docusign | - |
Dynatrace | - |
Tenera | - |
Docker | - |
New Relic | - |
Hotjar | |
Splunk | - |
Outlook | - |
Azure | Github |
AWS | - |
Pivotal Tracker | |
Jamf | - |
JumpCloud | - |