Lab Material for the Two-Day Defending Modern DevOps Environments Course
☆126Dec 4, 2019Updated 6 years ago
Alternatives and similar repositories for Defending-DevOps
Users that are interested in Defending-DevOps are comparing it to the libraries listed below
Sorting:
- Lab Material for Android Attack & Defense Course☆15Oct 16, 2019Updated 6 years ago
- A deliberately vulnerable Kubernetes cluster☆131Dec 15, 2023Updated 2 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- Kubernetes Easter CTF☆59Jul 10, 2020Updated 5 years ago
- OWASP Kubernetes Security Testing Guide☆41Dec 22, 2025Updated 2 months ago
- Lab Material for iOS Attack & Defense Course☆22Oct 15, 2019Updated 6 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- Security Payload Unit Test Repository (SPUTR)☆87Feb 18, 2026Updated last week
- Demos for several kubernetes security features☆64Jan 9, 2025Updated last year
- The domain enumeration and scanning tool for hackers☆18Sep 29, 2024Updated last year
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆32Nov 6, 2019Updated 6 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Oct 13, 2016Updated 9 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- A curated list of awesome Kubernetes security resources☆954Dec 15, 2023Updated 2 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Updated this week
- ☆13Feb 26, 2021Updated 5 years ago
- ☆36Jun 15, 2021Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- ☆14Oct 29, 2024Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆12Mar 31, 2021Updated 4 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- Getting Started With Cloud Native Security☆72Aug 17, 2020Updated 5 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆104Mar 17, 2023Updated 2 years ago
- apache solr 5.x - 8.2.0 rce (with config api)☆11Oct 31, 2019Updated 6 years ago
- Bootstrapping setup for participants☆10Dec 29, 2021Updated 4 years ago
- ☆11Aug 2, 2017Updated 8 years ago
- Using ESP8266/ESP32 to fetch satellite pass predictions from www.n2yo.com and display it on the E-Paper display.☆10Dec 20, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆15May 3, 2020Updated 5 years ago