1nval1dctf / terraform-aws-ctfdLinks
Terraform module for the salable deployment of CTFd on AWS
☆19Updated 3 months ago
Alternatives and similar repositories for terraform-aws-ctfd
Users that are interested in terraform-aws-ctfd are comparing it to the libraries listed below
Sorting:
- ctfcli is a tool to manage Capture The Flag events and challenges☆201Updated 3 weeks ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆305Updated this week
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆491Updated 7 months ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆538Updated 4 months ago
- kCTF is a Kubernetes-based infrastructure for CTF competitions. For documentation, see☆743Updated 4 months ago
- ☆89Updated 4 months ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆105Updated 2 years ago
- A curated list of Awesome Security Challenges.☆211Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆428Updated 3 weeks ago
- Scans your Github Actions for security issues☆88Updated last month
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆427Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆79Updated last month
- A deliberately vulnerable Kubernetes cluster☆131Updated 2 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆411Updated 3 months ago
- Holds the public Hacking the Cloud CTFs.☆63Updated last year
- ☆47Updated 4 years ago
- OWASP Foundation Web Respository☆100Updated last month
- NextJS-based single-page application for completing and reviewing SAMM assessments☆79Updated 2 years ago
- Supply-Chain Firewall (SCFW) is a tool for preventing the installation of malicious npm and PyPI packages☆214Updated this week
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆240Updated last month
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆195Updated 4 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆372Updated 4 months ago
- Manage a uniform team of security managers for every organization in your enterprise☆24Updated last month
- ☆268Updated 2 weeks ago
- Adaptive AWS Zero Trust Policy made easy: Auto-generate least-privilege policies based on user activity in real time! Accelerate the adop…☆76Updated last year
- Websec interview questions by tib3rius answered☆307Updated 2 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆149Updated last week
- ☆379Updated last year
- An online multiplayer version of the Elevation of Privilege (EoP) threat modeling card game☆158Updated this week
- ☆423Updated 3 years ago