BradleyA / docker-security-infrastructure
Automate the generation, setup, check, copy site, host and user docker TLS certificates; Setup and manage dockerd configuration for Ubuntu 16.04 Systemd & Ubuntu 14.04 Upstart. Check ssh permissions
☆17Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for docker-security-infrastructure
- Policy Pipeline : place an SDLC around your compliance documentation with a pipeline that renders policy-as-code to human friendly format…☆11Updated 4 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆28Updated 4 months ago
- AWS container security survey 2020☆11Updated 3 years ago
- A curated list of Cloud Security techniques and tools☆30Updated last year
- Appilot is a Platform for ready to use Social Media Automation Bots on Real Devices, Android and Emulators. NO ADB, NO LAPTOP Needed.☆18Updated 2 weeks ago
- An example for creating AWS AMIs with packer☆13Updated 6 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 2 years ago
- Create machine images containing the Nessus vulnerability scanner☆11Updated 2 weeks ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- An AWS Lambda Port Scanner and SSL expiry checker☆12Updated 7 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Updated 4 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated 11 months ago
- Sample code snippets for consuming the CloudSploit API☆13Updated last year
- Scripts to set up a private tor network on kubernetes☆15Updated 7 years ago
- CISOfy Handbook☆29Updated 8 years ago
- masscan result parsing, web server fingerprinting☆19Updated 2 years ago
- Python script for privilege escalation for Python☆9Updated 4 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- dev level ;-)☆10Updated 5 years ago
- The Auditree data gathering and reporting tool.☆13Updated 2 months ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆12Updated 2 years ago
- Using Shodan to get a breakdown of the most common key names in public Redis servers.☆13Updated 6 years ago
- we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-…☆13Updated 2 years ago
- S3Insights is a platform for efficiently deriving security insights about S3 data through metadata analysis☆11Updated 2 months ago
- A commandline tool that wraps the Archerysec REST API for controlling Archery and executing quick, targeted scans.☆11Updated 5 months ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Run virtual machines in docker using qemu and practice exploitation techniques overcoming containers limitations.☆13Updated 3 years ago
- Useful scripts I have made for pentests. (nothing pretty)☆9Updated last year
- Following repository contains source codes used in my two Books.☆10Updated 9 years ago
- Hardened Windows Server image☆18Updated 5 years ago