GCP GOAT is the vulnerable application for learn the GCP Security
☆72May 20, 2025Updated 10 months ago
Alternatives and similar repositories for GCP-GOAT
Users that are interested in GCP-GOAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Aug 19, 2023Updated 2 years ago
- Damn Vulnerable Cloud Application☆211Sep 12, 2018Updated 7 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆419Oct 6, 2025Updated 6 months ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- This lab demonstrates some of the security concerns of a default Kubernetes Engine cluster configuration and the corresponding hardening …☆17Jul 29, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 3 months ago
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆560May 26, 2023Updated 2 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 5 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆435Oct 29, 2024Updated last year
- A Python script to authenticate and test access to Google Cloud Platform (GCP) resources.☆16Jan 31, 2024Updated 2 years ago
- Tools and blogs I use to perform GCP red teams☆142Jul 23, 2024Updated last year
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- ☆11May 12, 2022Updated 3 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Apr 1, 2026Updated 2 weeks ago
- Deploys Zeek on Google Cloud☆27Feb 24, 2026Updated last month
- ☆178Apr 22, 2023Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- GCP cloud security CTF☆48Jun 25, 2025Updated 9 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆66Apr 25, 2025Updated 11 months ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆34Nov 12, 2025Updated 5 months ago
- ☆17Mar 6, 2023Updated 3 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Create your own vulnerable by design AWS penetration testing playground☆441Feb 16, 2026Updated 2 months ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆80Jan 30, 2024Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- dcsync bof☆51Feb 13, 2026Updated 2 months ago
- ☆84May 1, 2023Updated 2 years ago
- A toolset to juggle AWS roles for persistent access☆62Aug 14, 2024Updated last year
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Cloud Commotion intends to cause chaos to simulate security incidents☆148Jun 18, 2024Updated last year
- ☆19Jul 9, 2022Updated 3 years ago