TupleType / awesome-cicd-attacks
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
☆507Updated this week
Alternatives and similar repositories for awesome-cicd-attacks:
Users that are interested in awesome-cicd-attacks are comparing it to the libraries listed below
- GitHub Actions Pipeline Enumeration and Attack Tool☆584Updated this week
- Awesome secure by default libraries to help you eliminate bug classes!☆680Updated 3 months ago
- Websec interview questions by tib3rius answered☆306Updated last year
- ☆163Updated 5 months ago
- Gram is Klarna's own threat model diagramming tool☆319Updated this week
- Create your own vulnerable by design AWS penetration testing playground☆351Updated 3 weeks ago
- ☆359Updated 10 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆273Updated 5 months ago
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 3 months ago
- boostsecurityio/poutine☆254Updated last week
- Nord Stream is a tool that allows you to extract secrets stored inside CI/CD environments by deploying malicious pipelines. It currently …☆270Updated 2 weeks ago
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆226Updated 5 months ago
- ☆289Updated 6 months ago
- A full insecure kubernetes application for testing security tools☆66Updated this week
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆456Updated last week
- Tool for building Kubernetes attack paths☆818Updated last week
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆793Updated last month
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆367Updated 3 months ago
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆283Updated 10 months ago
- Generate datasets of cloud audit logs for common attacks☆199Updated 6 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆146Updated 3 months ago
- This is a companion to the Security Engineer Questions☆202Updated last year
- ☆404Updated 2 years ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆493Updated last year
- Octoscan is a static vulnerability scanner for GitHub action workflows.☆190Updated last month
- A tool to uncover undocumented APIs from the AWS Console.☆95Updated 3 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆130Updated last year
- A curated list of resources about detecting threats and defending Kubernetes systems.☆373Updated last year
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆239Updated this week
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆216Updated last month