OWASP / www-project-cloud-native-application-security-top-10Links
OWASP Foundation Web Respository
☆35Updated 9 months ago
Alternatives and similar repositories for www-project-cloud-native-application-security-top-10
Users that are interested in www-project-cloud-native-application-security-top-10 are comparing it to the libraries listed below
Sorting:
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated last month
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆14Updated 5 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 4 years ago
- ☆127Updated 11 months ago
- A very vulnerable implementation of a GraphQL API.☆59Updated 3 years ago
- Virtual Security Operations Center☆50Updated last year
- Semgrep rules corresponding to the OWASP ASVS standard☆27Updated 4 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- ☆36Updated 4 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆31Updated 2 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 7 months ago
- Tool to check the CloudTrail configuration and the services where trails are sent, to detect potential attacks to CloudTrail logging.☆13Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- WAF bypass PoC☆48Updated last year
- Route53/CloudFront Vulnerability Assessment Utility☆86Updated last year
- ☆90Updated 3 years ago
- Whitebox evaluation of effective S3 object permissions, to identify publicly accessible files.☆76Updated 3 years ago
- ☆57Updated 2 years ago
- AWS SSO serverless phishing API.☆32Updated 3 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆31Updated 3 years ago
- GCP cloud security CTF☆45Updated last month
- Burp Extension for AWS Signing☆89Updated 5 months ago