TupleType / awesome-cicd-attacks
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
☆489Updated 3 weeks ago
Related projects ⓘ
Alternatives and complementary repositories for awesome-cicd-attacks
- Create your own vulnerable by design AWS penetration testing playground☆331Updated 5 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆570Updated 3 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆266Updated 2 months ago
- Websec interview questions by tib3rius answered☆303Updated last year
- ☆356Updated 7 months ago
- ☆152Updated 2 months ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆443Updated last month
- Gram is Klarna's own threat model diagramming tool☆282Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆669Updated 3 weeks ago
- A curated list of resources about detecting threats and defending Kubernetes systems.☆364Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆359Updated 3 weeks ago
- boostsecurityio/poutine☆231Updated this week
- This repo contains IOC, malware and malware analysis associated with Public cloud☆244Updated last week
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆171Updated last week
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆207Updated 2 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆140Updated this week
- This is a companion to the Security Engineer Questions☆200Updated 11 months ago
- 💀 Don't fear the Reaper 👻☆390Updated this week
- Cloud Commotion intends to cause chaos to simulate security incidents☆140Updated 5 months ago
- ☆168Updated last month
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆480Updated 9 months ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆253Updated last week
- Documenting your Threat Models with HCL☆401Updated 2 months ago
- ☆292Updated 3 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆309Updated this week
- ☆400Updated last year
- Collection of Threat Models☆383Updated 2 years ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆126Updated 9 months ago
- Halberd : Multi-Cloud Attack Tool☆208Updated this week
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆149Updated 8 months ago