cider-security-research / cicd-goat
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
☆2,043Updated 8 months ago
Alternatives and similar repositories for cicd-goat:
Users that are interested in cicd-goat are comparing it to the libraries listed below
- Automating situational awareness for cloud penetration tests.☆2,059Updated 2 weeks ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,814Updated last month
- Checklist for container security - devsecops practices☆1,551Updated last year
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,153Updated 4 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆1,965Updated 3 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,665Updated 6 months ago
- ☆406Updated 2 years ago
- 📚 A curated list of awesome Docker security resources☆663Updated 4 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,288Updated last month
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆907Updated last month
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆972Updated 4 months ago
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,227Updated 4 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆1,962Updated last week
- Identify privilege escalation paths within and across different clouds☆684Updated 4 months ago
- A curated list of awesome CI CD security resources☆540Updated 4 months ago
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,585Updated 4 months ago
- API Security Project aims to present unique attack & defense methods in API Security field☆1,374Updated last year
- ☆1,666Updated last week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,024Updated 3 weeks ago
- Notes about attacking Jenkins servers☆2,038Updated 8 months ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆833Updated 5 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,611Updated last week
- completely ridiculous API (crAPI)☆1,201Updated last week
- ☆638Updated last week
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,216Updated 2 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,362Updated this week
- Vulnerable app with examples showing how to not use secrets☆1,292Updated this week
- Azure and AWS Attacks☆1,100Updated 2 years ago
- Curated list of links, references, books videos, tutorials (Free or Paid), Exploit, CTFs, Hacking Practices etc. which are related to AWS…☆1,337Updated last week
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,768Updated 10 months ago