DockerSecurityPlayground / DSPLinks
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆628Updated 7 months ago
Alternatives and similar repositories for DSP
Users that are interested in DSP are comparing it to the libraries listed below
Sorting:
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆645Updated 6 years ago
- The Open-Source AWS Cyber Range☆491Updated 5 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆601Updated last year
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆285Updated 2 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,309Updated 11 months ago
- A container analysis and exploitation tool for pentesters and engineers.☆674Updated 2 years ago
- ☆267Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆551Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆390Updated 5 years ago
- A tool to hunt for credentials in github wild AKA git*hunt☆297Updated 3 years ago
- Red Team Tactics, Techniques, and Procedures☆419Updated 3 months ago
- OWASP Honeypot, Automated Deception Framework.☆471Updated last year
- Peirates - Kubernetes Penetration Testing tool☆1,412Updated 5 months ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆765Updated 3 years ago
- a Damn Vulnerable Serverless Application☆544Updated 2 years ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆712Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,260Updated 3 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆949Updated 3 years ago
- Overlord - Red Teaming Infrastructure Automation☆626Updated last year
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆456Updated 2 months ago
- A Virtual environment for Pentesting IoT Devices☆439Updated 4 months ago
- A deliberately vulnerable Kubernetes cluster☆131Updated 2 years ago
- DejaVU - Open Source Deception Framework☆425Updated 5 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆749Updated 2 years ago
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆305Updated last week
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆613Updated 6 years ago
- A list of shodan filters☆583Updated 7 years ago
- A modular OSINT honeypot for blue teamers☆340Updated 2 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆750Updated 3 years ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆301Updated 2 years ago