1nval1dctf / terraform-aws-ctfdLinks
Terraform module for the salable deployment of CTFd on AWS
☆19Updated last month
Alternatives and similar repositories for terraform-aws-ctfd
Users that are interested in terraform-aws-ctfd are comparing it to the libraries listed below
Sorting:
- ctfcli is a tool to manage Capture The Flag events and challenges☆200Updated 2 weeks ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆299Updated this week
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆523Updated 2 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆418Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆406Updated 3 months ago
- A curated list of Awesome Security Challenges.☆197Updated last year
- A deliberately vulnerable Kubernetes cluster☆130Updated last year
- Scans your Github Actions for security issues☆86Updated last week
- ☆47Updated 4 years ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆483Updated 5 months ago
- OWASP Foundation Web Respository☆100Updated this week
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated last year
- Holds the public Hacking the Cloud CTFs.☆60Updated last year
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆406Updated last month
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆731Updated 2 months ago
- Websec interview questions by tib3rius answered☆309Updated 2 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆600Updated last year
- Identify privilege escalation paths within and across different clouds☆705Updated 3 weeks ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆234Updated 2 weeks ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆735Updated 2 years ago
- boostsecurityio/poutine☆345Updated last week
- ☆265Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆74Updated last month
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Updated 2 years ago
- ☆378Updated last year
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆187Updated this week
- Serverless Functions for establishing Reverse Shells to Lambda, Azure Functions, and Google Cloud Functions☆250Updated 4 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆368Updated 2 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆312Updated last month
- OWASP Foundation Web Respository☆47Updated this week