DockerSecurityPlayground / DSPLinks
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆594Updated last week
Alternatives and similar repositories for DSP
Users that are interested in DSP are comparing it to the libraries listed below
Sorting:
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆630Updated 5 years ago
- Overlord - Red Teaming Infrastructure Automation☆623Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,287Updated 5 months ago
- The Open-Source AWS Cyber Range☆488Updated 4 years ago
- ☆249Updated 9 months ago
- A container analysis and exploitation tool for pentesters and engineers.☆666Updated last year
- A Virtual environment for Pentesting IoT Devices☆427Updated last year
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆281Updated 2 years ago
- NERVE Continuous Vulnerability Scanner☆458Updated last year
- Peirates - Kubernetes Penetration Testing tool☆1,331Updated last month
- Cloud-related research releases from the Rhino Security Labs team.☆388Updated 5 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆578Updated 6 months ago
- Identify privilege escalation paths within and across different clouds☆698Updated last week
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,175Updated 4 months ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆741Updated 3 years ago
- Red Team Tactics, Techniques, and Procedures☆405Updated 2 weeks ago
- SimplE RePort wrIting and COllaboration tool☆1,099Updated 5 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆699Updated 9 months ago
- A query aggregator for OSINT based threat hunting☆899Updated this week
- WeirdAAL (AWS Attack Library)☆813Updated 5 months ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆521Updated 2 years ago
- An archive of everything related to OSCP☆619Updated 4 years ago
- A modular OSINT honeypot for blue teamers☆335Updated 2 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆353Updated 4 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆634Updated 4 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,330Updated 4 months ago
- A collection of Red Team focused tools, scripts, and notes☆1,131Updated 7 months ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆606Updated 5 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆712Updated last year