1nval1dctf / terraform-aws-ctfdLinks
Terraform module for the salable deployment of CTFd on AWS
☆19Updated 2 months ago
Alternatives and similar repositories for terraform-aws-ctfd
Users that are interested in terraform-aws-ctfd are comparing it to the libraries listed below
Sorting:
- ctfcli is a tool to manage Capture The Flag events and challenges☆196Updated 4 months ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆517Updated last year
- Create your own vulnerable by design AWS penetration testing playground☆393Updated last week
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆292Updated last week
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆410Updated 10 months ago
- A curated list of Awesome Security Challenges.☆195Updated 10 months ago
- Holds the public Hacking the Cloud CTFs.☆57Updated last year
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆398Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- Websec interview questions by tib3rius answered☆311Updated last year
- Scans your Github Actions for security issues☆83Updated last week
- A tool for preventing the installation of malicious npm and PyPI packages☆158Updated last week
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆134Updated 5 months ago
- boostsecurityio/poutine☆313Updated this week
- ☆189Updated 4 months ago
- App that simplifies building decision trees to model adverse scenarios☆216Updated last year
- ☆372Updated last year
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆723Updated last year
- Serverless Functions for establishing Reverse Shells to Lambda, Azure Functions, and Google Cloud Functions☆249Updated last month
- This is a companion to the Security Engineer Questions☆204Updated last year
- A deliberately vulnerable Kubernetes cluster☆128Updated last year
- OWASP Foundation Web Respository☆98Updated 7 months ago
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆536Updated 6 months ago
- ☆180Updated 4 months ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆221Updated 4 months ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆187Updated 3 weeks ago
- An AWS IAM policy statement parser and query tool.☆193Updated 2 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆298Updated last month
- A curated list of resources about detecting threats and defending Kubernetes systems.☆392Updated 2 years ago
- This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).☆20Updated 5 months ago