1nval1dctf / terraform-aws-ctfd
Terraform module for the salable deployment of CTFd on AWS
☆18Updated last month
Related projects ⓘ
Alternatives and complementary repositories for terraform-aws-ctfd
- ctfcli is a tool to manage Capture The Flag events and challenges☆174Updated last month
- ☆42Updated 3 years ago
- ☆153Updated 2 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆171Updated last week
- Docker Challenge creation for CTFd. Allows per team/user containers!☆79Updated 11 months ago
- ☆91Updated 6 months ago
- A beginner-friendly CTF about Kubernetes security.☆76Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆110Updated last year
- Holds the public Hacking the Cloud CTFs.☆50Updated 8 months ago
- Challenge infrastructure used for the DownUnderCTF competition☆18Updated last year
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆254Updated last week
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆112Updated last year
- boostsecurityio/lotp☆101Updated 7 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆359Updated 3 weeks ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆79Updated this week
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆131Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆57Updated 3 months ago
- Repository to archive AWS Documentation for local use☆38Updated last month
- Discord webhook plugin for CTFd☆31Updated 3 months ago
- Hide from the InstanceCredentialExfiltration GuardDuty finding by using VPC Endpoints☆113Updated last year
- ☆170Updated last year
- Manage a uniform team of security managers for every organization in your enterprise☆17Updated 3 months ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆275Updated this week
- A full insecure kubernetes application for testing security tools☆54Updated this week
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆46Updated 10 months ago
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆61Updated 5 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆96Updated 11 months ago
- Nextdoor's Cloud Security Posture Management (CSPM) Evaluation Matrix☆58Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆244Updated last week
- ☆168Updated this week