DockerSecurityPlayground / DSPLinks
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆630Updated 4 months ago
Alternatives and similar repositories for DSP
Users that are interested in DSP are comparing it to the libraries listed below
Sorting:
- A container analysis and exploitation tool for pentesters and engineers.☆674Updated 2 years ago
- The Open-Source AWS Cyber Range☆495Updated 5 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆392Updated 5 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆284Updated 2 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆597Updated 10 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,298Updated 9 months ago
- ☆264Updated last year
- Host and manage multiple Juice Shop instances for security trainings and Capture The Flags☆297Updated this week
- OWASP Honeypot, Automated Deception Framework.☆466Updated last year
- a Damn Vulnerable Serverless Application☆543Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆536Updated 2 years ago
- Repo for all the SKF Docker lab examples☆458Updated last year
- Red Team Tactics, Techniques, and Procedures☆418Updated 2 weeks ago
- A tool to hunt for credentials in github wild AKA git*hunt☆297Updated 2 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆486Updated 2 years ago
- Tool to export Juice Shop challenges and hints in data format compatible with CTFd, RootTheBox or FBCTF☆452Updated last month
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆714Updated 2 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,363Updated 2 months ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆763Updated 3 years ago
- Antora/Asciidoc content for Bjoern Kimminich's free eBook "Pwning OWASP Juice Shop"☆231Updated this week
- Awesome cloud enumerator☆1,051Updated 7 months ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆301Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,253Updated 3 years ago
- Network reconnaissance and vulnerability assessment tools.☆402Updated 3 years ago
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆748Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆439Updated last month
- AI-based, context-driven network device ranking☆301Updated last year
- A modular OSINT honeypot for blue teamers☆340Updated 2 years ago
- The DevSecOps toolset for REST APIs☆276Updated 2 years ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆941Updated 2 years ago