Swordfish-Security / Pentest-In-DockerLinks
Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)
☆95Updated 5 years ago
Alternatives and similar repositories for Pentest-In-Docker
Users that are interested in Pentest-In-Docker are comparing it to the libraries listed below
Sorting:
- OWASP Raider: a novel framework for manipulating the HTTP processes of persistent sessions☆103Updated 2 years ago
- Damn Vulnerable Cloud Application☆200Updated 7 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆294Updated 4 months ago
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆284Updated 2 years ago
- ☆104Updated 6 years ago
- Docker image for Osmedeus, a fully automated offensive security tool for reconnaissance and vulnerability scanning☆103Updated 4 months ago
- Kubolt utility for scanning public kubernetes clusters☆110Updated 3 weeks ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- Damn Vulnerable Java (EE) Application☆144Updated last year
- Scan DockerHub images that match a keyword to find secrets.☆61Updated 4 years ago
- Finding exposed secrets and personal data in GitLab☆202Updated last year
- Application Security pipelines☆51Updated 3 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆193Updated last year
- A curated list of security tools for Hackers & Builders!☆98Updated last year
- ☆127Updated last year
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆54Updated 3 years ago
- Virtual environment for learning DevSecOps☆39Updated 8 years ago
- ☆94Updated 3 years ago
- Docker toolbox for pentest of web based application.☆173Updated this week
- A lab to play with authentication and authorisation problems☆98Updated 2 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆156Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- Secrets scanner that understands code☆191Updated 2 years ago
- API Security Project aims to present unique attack & defense methods in API Security field☆287Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- ☆142Updated last week
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago