Due to security assessments of different projects, I found different leaked/exposed accounts on the domain of the organization. But every time it was so difficult to discover the place where I can reuse those credentials and how can I expand my attack surface. I started collecting a list of popular technological services which might have high value in case of improper access. This project should help researchers, pentesters, bounty-hunters to expand the risks of compromised accounts in the corporate environment.
| Service Name | Trusted login providers |
|---|---|
| Gitlab | Google, Salesforce, Github, Bitbucket, Twitter |
| Travis CI | Github, Bitbucket, Gitlab, Assembla |
| Grafana | Google, Github, Microsoft |
| Sentry | Google, Github, Azure DevOps |
| Slack | |
| Raygun | Github, Twitter, Facebook, Google |
| Datadog | |
| Atlassian | Google, Microsoft, Apple |
| Trello | Google, Microsoft, Apple |
| Trailblazer | Salesforce |
| Bitbucket | Google, Microsoft, Apple |
| Elastic Cloud | Google, Microsoft |
| Netdata Cloud | Google, Github |
| Jetbrains | Bitbucket |
| Box | |
| Skype | Microsoft |
| Dropbox | Google, Apple |
| Auth0 | Github, Google, Linkedin, Microsoft |
| Miro | Google, Facebook, Slack, Office365, Apple |
| Salesforce | - |
| GitHub | - |
| Eclipse | - |
| Docusign | - |
| Dynatrace | - |
| Tenera | - |
| Docker | - |
| New Relic | - |
| Hotjar | |
| Splunk | - |
| Outlook | - |
| Azure | Github |
| AWS | - |
| Pivotal Tracker | |
| Jamf | - |
| JumpCloud | - |