DockerSecurityPlayground / DSPLinks
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆623Updated 3 months ago
Alternatives and similar repositories for DSP
Users that are interested in DSP are comparing it to the libraries listed below
Sorting:
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆641Updated 5 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆283Updated 2 years ago
- The Open-Source AWS Cyber Range☆492Updated 5 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆671Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆593Updated 9 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,358Updated last month
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,294Updated 7 months ago
- Cloud-related research releases from the Rhino Security Labs team.☆391Updated 5 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆537Updated 2 years ago
- ☆261Updated last year
- A tool to hunt for credentials in github wild AKA git*hunt☆297Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,250Updated 3 years ago
- a Damn Vulnerable Serverless Application☆541Updated 2 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆758Updated 3 years ago
- OWASP Honeypot, Automated Deception Framework.☆462Updated last year
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆483Updated 2 years ago
- Red Team Tactics, Techniques, and Procedures☆411Updated last month
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,198Updated 7 months ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆292Updated this week
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆712Updated last year
- An archive of everything related to OSCP☆620Updated 5 years ago
- Awesome cloud enumerator☆1,043Updated 6 months ago
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,388Updated 7 months ago
- AI-based, context-driven network device ranking☆300Updated last year
- A list of shodan filters☆576Updated 6 years ago
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆230Updated this week
- NERVE Continuous Vulnerability Scanner☆458Updated last year
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Updated 4 years ago
- DejaVU - Open Source Deception Framework☆415Updated last month