TupleType / awesome-cicd-attacksLinks
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
☆561Updated last month
Alternatives and similar repositories for awesome-cicd-attacks
Users that are interested in awesome-cicd-attacks are comparing it to the libraries listed below
Sorting:
- Awesome secure by default libraries to help you eliminate bug classes!☆701Updated 7 months ago
- Gram is Klarna's own threat model diagramming tool☆328Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆718Updated 2 months ago
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆484Updated 5 months ago
- A full insecure kubernetes application for testing security tools☆90Updated last month
- Websec interview questions by tib3rius answered☆308Updated 2 years ago
- Create your own vulnerable by design AWS penetration testing playground☆407Updated 3 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆469Updated 5 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆289Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 2 months ago
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆820Updated 8 months ago
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆466Updated last week
- ☆193Updated 7 months ago
- CI/CD Security Analyzer☆722Updated 9 months ago
- Tool for building Kubernetes attack paths☆925Updated 2 weeks ago
- ☆378Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆420Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆398Updated 2 years ago
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆313Updated last month
- This is a companion to the Security Engineer Questions☆206Updated 2 years ago
- boostsecurityio/poutine☆347Updated last week
- ☆421Updated 2 years ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆368Updated 2 months ago
- Threat matrix for CI/CD Pipeline☆759Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆305Updated 3 months ago
- ☆315Updated 4 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆177Updated 7 months ago
- A curated list of Awesome Security Challenges.☆197Updated last year
- Halberd : Multi-Cloud Agentic Attack Tool☆321Updated 3 weeks ago
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆235Updated 3 weeks ago