The invoicer for Chapter 2 of Securing DevOps
☆48Jan 6, 2026Updated 2 months ago
Alternatives and similar repositories for invoicer-chapter2
Users that are interested in invoicer-chapter2 are comparing it to the libraries listed below
Sorting:
- CTF Writeups☆23May 9, 2018Updated 7 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- With this tool, projects can be compiled easily for fuzzing with AFL or for static code analysis with tools like CBMC. One-line-scan hook…☆21Jan 3, 2023Updated 3 years ago
- Terraform module which provides easy to configure AWS environment for running automated security scanning solutions at scheduled interval…☆46Jan 29, 2019Updated 7 years ago
- A framework for understanding the capabilities of automated detection methods at identifying classes of application security vulnerabilit…☆33Updated this week
- An example pattern in C# for watching security events (logon/logoff/privilege)☆17Aug 13, 2018Updated 7 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- statistics collector written primarily for gunicorn, but usable on anything that can do a pre_request and a post_request action and repor…☆23Dec 17, 2019Updated 6 years ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- ☆11Dec 9, 2025Updated 3 months ago
- Bash wrapper script for Aquasec Microscanner☆61Jan 20, 2020Updated 6 years ago
- Python 3 Reverse Shell☆26Jan 2, 2022Updated 4 years ago
- ⏛ - Kubernetes deploy and management tool (powerful wrapper around kubectl)☆10Jul 5, 2018Updated 7 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Tampermonkey script to extract information from Meteor applications☆34Nov 3, 2016Updated 9 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Reconnaissance Test for Kubernetes.☆11Aug 13, 2024Updated last year
- ☆11Nov 5, 2018Updated 7 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆15Apr 14, 2020Updated 5 years ago
- A Terraform script to deploy a k3s on Hetzner Cloud☆10Feb 2, 2021Updated 5 years ago
- Decrypt AES256GCM-encrypted data in Apple Pay Payment Tokens.☆10Nov 30, 2018Updated 7 years ago
- A framework for interacting with HCL AppScan on Cloud and HCL AppScan Enterprise☆12Mar 3, 2023Updated 3 years ago
- ☆16Oct 26, 2018Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Jul 7, 2017Updated 8 years ago
- Is a project of file for attack other sites on server.☆18Oct 24, 2016Updated 9 years ago
- A playground to practice SSRF Attacks against web apps☆17Oct 15, 2018Updated 7 years ago
- Simple "postMessage logger" Chrome extension☆103May 2, 2020Updated 5 years ago
- This repo shows how to test and mock multiple dependencies using table-driven tests with testify-mock in Golang☆15Mar 23, 2021Updated 4 years ago
- verinice.veo is a cloud-native application for managing information security and data protection☆22Updated this week
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- Parser to convert BURP Pro .XML to .CSV and build a Word .Docx Template☆14Dec 8, 2021Updated 4 years ago
- This repository is used by FalconForce to release parts of the internal tools used for maintaining, validating and automatically deployin…☆18Mar 10, 2023Updated 3 years ago
- [DEPRECATED] See https://github.com/src-d/go-mysql-server☆10Feb 9, 2018Updated 8 years ago
- Presentations☆10Oct 2, 2017Updated 8 years ago
- CDPO is a tool to validate, de-duplicate, combine, query, and encrypt track data recovered from a breach.☆15Jun 23, 2017Updated 8 years ago