TupleType / awesome-cicd-attacksLinks
Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.
☆533Updated 5 months ago
Alternatives and similar repositories for awesome-cicd-attacks
Users that are interested in awesome-cicd-attacks are comparing it to the libraries listed below
Sorting:
- Awesome secure by default libraries to help you eliminate bug classes!☆698Updated 3 months ago
- Gram is Klarna's own threat model diagramming tool☆322Updated last week
- A full insecure kubernetes application for testing security tools☆89Updated 3 months ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆689Updated last month
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆478Updated last month
- Create your own vulnerable by design AWS penetration testing playground☆388Updated 3 months ago
- Websec interview questions by tib3rius answered☆309Updated last year
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆286Updated 11 months ago
- ☆187Updated 3 months ago
- A collection of real-world threat model examples across various technologies, providing practical insights into identifying and mitigatin…☆439Updated last month
- GitHub Attack Toolkit - Extreme Edition - A static analysis and exploit toolkit for GitHub Actions.☆382Updated 2 weeks ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆404Updated 9 months ago
- boostsecurityio/poutine☆308Updated this week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆387Updated last year
- Detect and remediate misconfigurations and security risks across all your GitHub and GitLab assets☆813Updated 4 months ago
- ☆370Updated last year
- CI/CD Security Analyzer☆663Updated 5 months ago
- Use AI to Scan Your Code from the Command Line for security and code smells. Bring your own keys. Supports OpenAI and Gemini☆174Updated 3 months ago
- An open project to list all publicly known cloud vulnerabilities and CSP security issues☆349Updated 2 months ago
- A curated list of Awesome Security Challenges.☆192Updated 9 months ago
- RedFlag uses AI to identify high-risk code changes. Run it in batch mode for release candidate testing or in CI pipelines to flag PRs and…☆152Updated 8 months ago
- This is a companion to the Security Engineer Questions☆204Updated last year
- A built-to-be-vulnerable API application based on the OWASP top 10 API vulnerabilities. Use c{api}tal to learn, train and exploit API Sec…☆297Updated last year
- Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @Webbi…☆258Updated 2 months ago
- A compilation of Software Supply Chain Security resources including initiatives, standards, regulations, organizations, vendors, tooling,…☆135Updated last year
- Cloud Commotion intends to cause chaos to simulate security incidents☆143Updated last year
- The OWASP DevSecOps Guideline explains how we can implement a secure pipeline and use best practices and introduce tools that we can use …☆69Updated last year
- This repo contains IOC, malware and malware analysis associated with Public cloud☆248Updated 8 months ago
- Threat matrix for CI/CD Pipeline☆757Updated last year
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆244Updated 3 months ago