Whitespots-OU / DevSecOps-Pipelines
Application Security pipelines
☆50Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for DevSecOps-Pipelines
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆97Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- A repository with informtion related to Cloud Osint☆80Updated 3 weeks ago
- Web Hacking and Red Teaming MindMap☆68Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated last year
- vhost scanning☆32Updated last year
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆38Updated last year
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆65Updated 8 months ago
- Challenge Python☆19Updated last year
- ☆75Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆42Updated last year
- ☆12Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆73Updated 4 years ago
- Striping CDN IPs from a list of IP Addresses☆74Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆78Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Tools used for Pentesting☆22Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆92Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated 11 months ago
- Red Teaming tools and techniques☆47Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆83Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated this week
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆50Updated 2 years ago
- Mind Maps for penetration testing☆17Updated 3 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆56Updated last year