OWASP / kstgLinks
Kubernetes Security Testing Guide
☆26Updated last year
Alternatives and similar repositories for kstg
Users that are interested in kstg are comparing it to the libraries listed below
Sorting:
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Updated 5 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- A git submodule list containing all the tools repo's you'll ever need.☆27Updated 6 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- OWASP Kubernetes Security Testing Guide☆38Updated 10 months ago
- A curated list of security tools for Hackers & Builders!☆100Updated 11 months ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- Pivot into private VPC networks using a VPN connection☆43Updated 5 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- Tools to automate AWS Cloud security assessments☆25Updated 5 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Reconnaissance tool for GitLab and GitHub organizations☆50Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Updated 4 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- ZAP Management Scripts☆23Updated last month
- ☆24Updated 3 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- Security checks for your researches☆33Updated 4 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 5 years ago
- Dependency Combobulator☆93Updated last year
- ☆27Updated last month
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A command line security audit tool for Amazon Web Services☆82Updated 6 years ago