Kubernetes Security Testing Guide
☆26Apr 22, 2024Updated 2 years ago
Alternatives and similar repositories for kstg
Users that are interested in kstg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 3 years ago
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Apr 27, 2017Updated 9 years ago
- OWASp PureCaptcha project☆25Dec 15, 2019Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Jun 11, 2020Updated 5 years ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 7 years ago
- Implementation of libsodium's secretstream in Go☆21Apr 9, 2026Updated last month
- TelerikUI Vulnerability Scanner (CVE-2019-18935)☆13May 10, 2023Updated 3 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- A collection of simple to use renderers for ImGui.☆15Mar 25, 2016Updated 10 years ago
- ☆25Mar 13, 2021Updated 5 years ago
- GitHub Action adding a comment with information about new npm dependencies detected in a pull request☆17Mar 30, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Check for certs affected by July 2020 OCSP intermediate incident☆13Jul 15, 2020Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆77Nov 19, 2024Updated last year
- ☆35Jun 30, 2020Updated 5 years ago
- Solutions for Ethernaut CTF (https://ethernaut.openzeppelin.com) - Writeups at https://notonlyowner.com☆12May 9, 2021Updated 5 years ago
- automatically detect software supply chain smells and issues http://arxiv.org/pdf/2410.16049☆18Apr 14, 2026Updated last month
- The action integrates Electronegativity, a tool to identify misconfigurations and security anti-patterns in Electron applications, into G…☆15Apr 15, 2023Updated 3 years ago
- Wraps projectdiscovery's cdncheck library to exclude CDN hosts from input passed over stdin☆45Mar 13, 2023Updated 3 years ago
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- Swachalit - The null automation platform that hosts null.co.in.☆21Dec 10, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- An Android application that prints office documents and PDF files to Unix printers in NUS School Of Computing via SSH☆16Oct 2, 2015Updated 10 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆355Oct 14, 2020Updated 5 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆136Dec 22, 2022Updated 3 years ago
- Sample app to go with "Web Developers' HTTP Toolbox" workshop☆13Feb 26, 2019Updated 7 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Nov 18, 2019Updated 6 years ago
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 7 months ago
- Python program that denies internet access to a target within a local network...☆22Jun 7, 2021Updated 4 years ago
- Windows productivity tweaks☆15Feb 21, 2020Updated 6 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Material from presentations done by GoSecure researchers☆34Oct 10, 2023Updated 2 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 8 months ago
- ☆13Nov 8, 2017Updated 8 years ago
- OWASP Findings Format☆19Mar 4, 2021Updated 5 years ago
- ☆11May 28, 2022Updated 3 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- (*Aug 2013 - †Aug 2016) Source code & hosting for http://tomasp.net☆23Sep 30, 2020Updated 5 years ago