DockerSecurityPlayground / DSP
A Microservices-based framework for the study of Network Security and Penetration Test techniques
☆592Updated 6 months ago
Alternatives and similar repositories for DSP:
Users that are interested in DSP are comparing it to the libraries listed below
- Cloud Container Attack Tool (CCAT) is a tool for testing security of container environments.☆620Updated 5 years ago
- Automated Attack Simulation in the Cloud, complete with detection use cases.☆557Updated 4 months ago
- A container analysis and exploitation tool for pentesters and engineers.☆663Updated last year
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,266Updated 2 months ago
- Overlord - Red Teaming Infrastructure Automation☆616Updated 10 months ago
- Cloud-related research releases from the Rhino Security Labs team.☆383Updated 4 years ago
- Automated Red Team Infrastructure deployement using Docker☆1,234Updated 2 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆268Updated last year
- The Open-Source AWS Cyber Range☆483Updated 4 years ago
- Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized en…☆1,157Updated last month
- A tool to hunt for credentials in github wild AKA git*hunt☆294Updated 2 years ago
- ☆239Updated 6 months ago
- Praetorian's public release of our Metasploit automation of MITRE ATT&CK™ TTPs☆721Updated 5 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,298Updated last week
- Imperva's customizable API attack tool takes an API specification as an input, generates and runs attacks that are based on it as an outp…☆470Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆535Updated 3 years ago
- A Virtual environment for Pentesting IoT Devices☆422Updated last year
- Awesome cloud enumerator☆991Updated 2 weeks ago
- A modular OSINT honeypot for blue teamers☆333Updated last year
- A curated list of awesome resources related to Mitre ATT&CK™ Framework☆595Updated 5 years ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆510Updated last year
- Offensive Docker is an image with the more used offensive tools to create an environment easily and quickly to launch assessment to the t…☆743Updated 3 years ago
- The OWASP SecureTea Project provides a one-stop security solution for various devices (personal computers / servers / IoT devices)☆296Updated last year
- ☆1,068Updated 5 years ago
- An archive of everything related to OSCP☆617Updated 4 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆695Updated 4 years ago
- PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems assoc…☆627Updated 3 years ago
- A collection of Red Team focused tools, scripts, and notes☆1,120Updated 4 months ago
- Security event correlation engine for ELK stack☆435Updated 9 months ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago