A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
☆2,202Jul 14, 2024Updated last year
Alternatives and similar repositories for cicd-goat
Users that are interested in cicd-goat are comparing it to the libraries listed below
Sorting:
- ☆423Jan 18, 2023Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,978May 20, 2025Updated 9 months ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,431Nov 18, 2025Updated 3 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,272Updated this week
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,490Feb 12, 2026Updated 3 weeks ago
- game of active directory☆7,505Updated this week
- Automating situational awareness for cloud penetration tests.☆2,303Updated this week
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆918Oct 30, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,889Oct 1, 2025Updated 5 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,080Feb 24, 2026Updated last week
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,034Jul 12, 2025Updated 7 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,260Apr 12, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆732Updated this week
- Adversary Emulation Framework☆10,798Updated this week
- Azure Security Resources and Notes☆1,713Feb 17, 2026Updated 2 weeks ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 9 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,425Jan 20, 2026Updated last month
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆432Oct 29, 2024Updated last year
- Multi-Cloud Security Auditing Tool☆7,562Sep 23, 2025Updated 5 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,266Dec 9, 2025Updated 3 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,158Updated this week
- Checklist for container security - devsecops practices☆1,613Sep 15, 2025Updated 5 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,487Dec 21, 2025Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,632Mar 2, 2026Updated last week
- A collection of scripts for assessing Microsoft Azure security☆2,313Oct 29, 2025Updated 4 months ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,546Feb 10, 2026Updated 3 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,645Aug 28, 2025Updated 6 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,424Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,300Mar 2, 2026Updated last week
- Find, verify, and analyze leaked credentials☆24,933Updated this week
- Create your own vulnerable by design AWS penetration testing playground☆437Feb 16, 2026Updated 3 weeks ago
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,160Updated this week
- Notes about attacking Jenkins servers☆2,091Jul 10, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,199Jan 5, 2026Updated 2 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,174Nov 25, 2024Updated last year
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated last month
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,535Feb 5, 2026Updated last month
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,685Jan 8, 2024Updated 2 years ago