Whitespots-OU / DevSecOps-PipelinesLinks
Application Security pipelines
☆51Updated 3 years ago
Alternatives and similar repositories for DevSecOps-Pipelines
Users that are interested in DevSecOps-Pipelines are comparing it to the libraries listed below
Sorting:
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆76Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 5 months ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆122Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆52Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆98Updated 6 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- ☆24Updated 5 months ago
- Red Team Guides☆139Updated last year
- Challenge Python☆19Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆77Updated last year
- Daily alert when a new domain name is registered and contains your keywords☆117Updated last year
- ☆20Updated 3 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆168Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆53Updated 3 years ago
- ☆76Updated 4 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆93Updated 2 years ago
- Collection of offensive tools targeting Microsoft Azure☆209Updated 2 years ago
- MayorSec DNS Enumeration Tool☆87Updated 8 months ago
- vhost scanning☆36Updated last year
- ☆56Updated last year