DockerSecurityPlayground / DSPLinks
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆627Updated 6 months ago
Alternatives and similar repositories for DSP
Users that are interested in DSP are comparing it to the libraries listed below
Sorting:
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆644Updated 6 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆283Updated 2 years ago
- The Open-Source AWS Cyber Range☆492Updated 5 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆676Updated 2 years ago
- Red Team Tactics, Techniques, and Procedures☆418Updated 2 months ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,308Updated 11 months ago
- A tool to hunt for credentials in github wild AKA git*hunt☆297Updated 3 years ago
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆765Updated 3 years ago
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆490Updated 2 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆546Updated 2 years ago
- Cloud-related research releases from the Rhino Security Labs team.☆392Updated 5 years ago
- ChopChop is a CLI to help developers scanning endpoints and identifying exposition of sensitive services/files/folders.☆713Updated 2 years ago
- The DevSecOps toolset for REST APIs☆277Updated 2 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,258Updated 3 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆600Updated last year
- Repo for all the SKF Docker lab examples☆461Updated last year
- ☆266Updated last year
- Network reconnaissance and vulnerability assessment tools.☆401Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆359Updated 5 years ago
- OWASP Honeypot, Automated Deception Framework.☆472Updated last year
- Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.☆750Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆437Updated 4 months ago
- An archive of everything related to OSCP☆627Updated 5 years ago
- NERVE Continuous Vulnerability Scanner☆457Updated 2 years ago
- A modular OSINT honeypot for blue teamers☆340Updated 2 years ago
- Awesome cloud enumerator☆1,068Updated 9 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,397Updated 4 months ago
- The main SamuraiWTF collaborative distro repo.☆545Updated 9 months ago
- Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands …☆946Updated 3 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆648Updated 4 years ago