Kubernetes Security Testing Guide
☆26Apr 22, 2024Updated 2 years ago
Alternatives and similar repositories for kstg
Users that are interested in kstg are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 3 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Jun 11, 2020Updated 5 years ago
- Finds internet-exposed resources in an AWS account☆18Sep 1, 2024Updated last year
- Tourist is an HTTP API around Microsoft Playwright for CTF challenges☆13Jun 25, 2025Updated 10 months ago
- Implementation of libsodium's secretstream in Go☆21Apr 9, 2026Updated 3 weeks ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- A collection of simple to use renderers for ImGui.☆15Mar 25, 2016Updated 10 years ago
- ☆25Mar 13, 2021Updated 5 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- ☆11Jan 2, 2022Updated 4 years ago
- GitHub Action adding a comment with information about new npm dependencies detected in a pull request☆17Mar 30, 2024Updated 2 years ago
- Unclutter your .profile☆11Jun 26, 2024Updated last year
- Check for certs affected by July 2020 OCSP intermediate incident☆13Jul 15, 2020Updated 5 years ago
- SNES for MiSTer☆16Sep 5, 2025Updated 7 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆77Nov 19, 2024Updated last year
- Invite users to a GitHub team in bulk☆12Jan 22, 2022Updated 4 years ago
- automatically detect software supply chain smells and issues http://arxiv.org/pdf/2410.16049☆18Apr 14, 2026Updated 2 weeks ago
- Browser based Privacy Aware SBoM Exploration☆34Apr 20, 2026Updated last week
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- Swachalit - The null automation platform that hosts null.co.in.☆21Dec 10, 2024Updated last year
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆355Oct 14, 2020Updated 5 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆135Dec 22, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Sample app to go with "Web Developers' HTTP Toolbox" workshop☆13Feb 26, 2019Updated 7 years ago
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 6 months ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 7 months ago
- ☆13Nov 8, 2017Updated 8 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- A documentation and tracking project with the goal of making package management systems more secure.☆51Mar 5, 2021Updated 5 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Oct 24, 2022Updated 3 years ago
- Collection of python helper API's for interacting with LGTM.com in ways the official API doesn't support.☆24Apr 8, 2022Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆11Oct 12, 2024Updated last year
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 5 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆31Aug 5, 2024Updated last year
- Be API implementation for Linux kernel and Android binder☆11Sep 19, 2023Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Python SDK to access the vulnerability database☆22Sep 5, 2019Updated 6 years ago
- Security Blueprint for Startups☆39Mar 17, 2020Updated 6 years ago