GCP GOAT is the vulnerable application for learn the GCP Security
☆72May 20, 2025Updated 11 months ago
Alternatives and similar repositories for GCP-GOAT
Users that are interested in GCP-GOAT are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Damn Vulnerable Cloud Application☆210Sep 12, 2018Updated 7 years ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆419Oct 6, 2025Updated 7 months ago
- Process dumper wrote in rust.☆14Sep 16, 2024Updated last year
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- This lab demonstrates some of the security concerns of a default Kubernetes Engine cluster configuration and the corresponding hardening …☆17Jul 29, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A script to enumerate Google Storage buckets, determine what access you have to them, and determine if they can be privilege escalated.☆562May 26, 2023Updated 2 years ago
- A broken-by-design Azure environment to practice and train security skills in the cloud domain.☆27Oct 20, 2025Updated 6 months ago
- Given a list of domains and known IP and buckets that are owned, which might be susceptible to domain hijacking?☆15Sep 20, 2024Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆439Oct 29, 2024Updated last year
- Burp Extension for copying requests safely. It redacts headers like Cookie, Authorization and X-CSRF-Token for now. More support can be a…☆18May 17, 2020Updated 5 years ago
- Plugin for YATAS that audits AWS accounts for misconfiguration and security issues☆15Updated this week
- Damn Vulnerable Rails app☆14Sep 20, 2012Updated 13 years ago
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆30Apr 1, 2026Updated last month
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Deploys Zeek on Google Cloud☆26Feb 24, 2026Updated 2 months ago
- ☆178Apr 22, 2023Updated 3 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- .NET Assembly that creates network shares,sets ACE entries for directories, sets share perms, and deletes shares. Learning project for C#☆10Oct 14, 2024Updated last year
- GCP cloud security CTF☆49Jun 25, 2025Updated 10 months ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Retrieve the complete build history for every job ever created and executed on a given Jenkins instance.☆67Apr 25, 2025Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆34Nov 12, 2025Updated 5 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Excel Add In Payload Generator☆14Oct 9, 2023Updated 2 years ago
- ☆17Mar 6, 2023Updated 3 years ago
- Educational Cybersecurity Gaming Experience☆10Dec 13, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆26Jun 11, 2025Updated 10 months ago
- Create your own vulnerable by design AWS penetration testing playground☆443Feb 16, 2026Updated 2 months ago
- JWK Key Generator☆14May 19, 2019Updated 6 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆80Jan 30, 2024Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- dcsync bof☆52Feb 13, 2026Updated 2 months ago
- Repository with some necessary information for you to create your PenTest consultancy☆102Jan 12, 2025Updated last year
- ☆38Jun 9, 2021Updated 4 years ago
- ☆85May 1, 2023Updated 3 years ago
- A toolset to juggle AWS roles for persistent access☆64Aug 14, 2024Updated last year
- Ludus role for deploying a Cobalt Strike Teamserver onto Linux servers☆18Mar 19, 2025Updated last year
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago