DockerSecurityPlayground / DSPLinks
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆596Updated last month
Alternatives and similar repositories for DSP
Users that are interested in DSP are comparing it to the libraries listed below
Sorting:
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆633Updated 5 years ago
- The Open-Source AWS Cyber Range☆489Updated 4 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆666Updated last year
- Cloud-related research releases from the Rhino Security Labs team.☆388Updated 5 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆282Updated 2 years ago
- ☆255Updated 10 months ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆526Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,291Updated 5 months ago
- Red Team Tactics, Techniques, and Procedures☆405Updated last month
- A tool to hunt for credentials in github wild AKA git*hunt☆295Updated 2 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆477Updated 2 years ago
- Repo for all the SKF Docker lab examples☆453Updated 11 months ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆744Updated 3 years ago
- The DevSecOps toolset for REST APIs☆273Updated 2 years ago
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆430Updated last week
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆580Updated 7 months ago
- a Damn Vulnerable Serverless Application☆541Updated last year
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆353Updated 4 years ago
- An archive of everything related to OSCP☆620Updated 4 years ago
- An installable desktop variant of OWASP Threat Dragon☆592Updated last month
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆692Updated last year
- A modular OSINT honeypot for blue teamers☆336Updated 2 years ago
- Network reconnaissance and vulnerability assessment tools.☆402Updated 3 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,336Updated last month
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆749Updated 3 years ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆296Updated last year
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆229Updated last week
- The Secure Coding Framework☆266Updated 4 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,249Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago