Whitespots-OU / DevSecOps-Pipelines
Application Security pipelines
☆50Updated 2 years ago
Alternatives and similar repositories for DevSecOps-Pipelines:
Users that are interested in DevSecOps-Pipelines are comparing it to the libraries listed below
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆70Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- A repository with informtion related to Cloud Osint☆88Updated 2 months ago
- ☆12Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆82Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- ☆93Updated 2 years ago
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆52Updated 3 years ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆116Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 6 months ago
- Repository with some necessary information for you to create your PenTest consultancy☆95Updated 2 months ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated last month
- Target practice for ffuf☆63Updated 3 years ago
- OSCP preparation tools, scripts and cheatsheets☆56Updated 2 years ago
- Red Team tools weaponized☆103Updated last month
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- ☆72Updated 10 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated 11 months ago
- Hi everyone,☆59Updated last year
- ☆35Updated this week
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- A collection of red blue team staff☆46Updated last year
- Collection of offensive tools targeting Microsoft Azure☆206Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆70Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆87Updated 2 years ago