Application Security Workflow Automation using Docker and Kubernetes
☆23Dec 11, 2022Updated 3 years ago
Alternatives and similar repositories for kubeseco
Users that are interested in kubeseco are comparing it to the libraries listed below
Sorting:
- ☆13Dec 8, 2022Updated 3 years ago
- Docker container for datasploit framework☆25Aug 3, 2017Updated 8 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Plugins for the Serpico Project☆23Dec 4, 2018Updated 7 years ago
- Yet Another SCA tool☆13Nov 10, 2022Updated 3 years ago
- A very fast network scanner of SSL server configurations☆11Mar 28, 2016Updated 9 years ago
- Systematic Universal Security Testing Orchestration☆37Mar 28, 2022Updated 3 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆15Dec 3, 2017Updated 8 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15May 14, 2024Updated last year
- ☆18Jan 9, 2026Updated last month
- Burp Suite extension for parsing Swagger web service definition files☆19Jul 15, 2025Updated 7 months ago
- Este repositorio é apenas um exemplo de como adicionar OWASP ZAP Actions em uma pipeline de DevOps.☆19Mar 12, 2021Updated 4 years ago
- OWASP Threat Dragon with Gitlab Integration☆27Nov 6, 2017Updated 8 years ago
- ☆21Sep 15, 2022Updated 3 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Apr 25, 2021Updated 4 years ago
- The OWASP ZAP Jenkins Plugin extends the functionality of the ZAP security tool into a CI Environment.☆58Oct 2, 2024Updated last year
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- ☆29Apr 26, 2025Updated 10 months ago
- CVE-2021-42008: Exploiting A 16-Year-Old Vulnerability In The Linux 6pack Driver☆31May 1, 2022Updated 3 years ago
- OSINT tool for domain discovery☆10Apr 5, 2024Updated last year
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- List of all previous CNCF Project's Security Audit Reports☆38Jan 13, 2021Updated 5 years ago
- Windows GUI/Execution Engine for Atomic Red Team Atomics☆36May 20, 2020Updated 5 years ago
- Serverless honeytoken 🕵🏻♂️☆81Jan 10, 2023Updated 3 years ago
- Azure Template Skype for Business lab V3 with Edge, ADFS and PSTN Gateway☆13May 2, 2017Updated 8 years ago
- Template Nuclei SSTI☆34Nov 18, 2025Updated 3 months ago
- Crossword client for Ubuntu☆10Sep 9, 2018Updated 7 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 4 years ago
- a python script that automates recon flow for a given target domain.☆10Apr 21, 2022Updated 3 years ago
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- DustiLock is a tool to find which of your dependencies is susceptible to a Dependency Confusion attack.☆40Nov 21, 2021Updated 4 years ago
- Assess Azure Security State☆38Jan 22, 2024Updated 2 years ago
- ☆12Feb 10, 2026Updated 3 weeks ago
- A python script for automating the collection of web pages with Hunchly.☆11Jan 11, 2021Updated 5 years ago
- ATL.dll and WmiMgmt.msc UAC Bypass☆12Apr 26, 2025Updated 10 months ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- Setup a RaspberryPi as a responder-in-a-box dropbox for Pentesting☆12Sep 22, 2017Updated 8 years ago
- ☆14Jun 5, 2020Updated 5 years ago