DockerSecurityPlayground / DSP
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆593Updated 6 months ago
Alternatives and similar repositories for DSP:
Users that are interested in DSP are comparing it to the libraries listed below
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆620Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,268Updated 3 months ago
- The Open-Source AWS Cyber Range☆487Updated 4 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆384Updated 5 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆665Updated last year
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆629Updated 3 years ago
- Overlord - Red Teaming Infrastructure Automation☆619Updated 10 months ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆694Updated 4 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,161Updated 2 months ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆271Updated 2 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,122Updated 5 months ago
- Exploits written by the Rhino Security Labs team☆1,074Updated 4 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,309Updated this week
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- Identify privilege escalation paths within and across different clouds☆687Updated last week
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,371Updated 3 weeks ago
- Awesome cloud enumerator☆1,000Updated last month
- Red Team Tactics, Techniques, and Procedures☆399Updated last month
- An information security preparedness tool to do adversarial simulation.☆1,121Updated 6 years ago
- ☆243Updated 7 months ago
- NERVE Continuous Vulnerability Scanner☆458Updated last year
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆515Updated last year
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆562Updated 4 months ago
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆597Updated 5 years ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆694Updated last year
- Issues to consider when planning a red team exercise.☆617Updated 7 years ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,302Updated 2 months ago
- ☆1,001Updated 3 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆537Updated 3 years ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆722Updated 5 years ago