cider-security-research / cicd-goatLinks
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
☆2,079Updated 10 months ago
Alternatives and similar repositories for cicd-goat
Users that are interested in cicd-goat are comparing it to the libraries listed below
Sorting:
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,857Updated last week
- ☆415Updated 2 years ago
- Automating situational awareness for cloud penetration tests.☆2,118Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,025Updated 3 weeks ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆848Updated 7 months ago
- A curated list of awesome CI CD security resources☆546Updated 7 months ago
- Vulnerable app with examples showing how to not use secrets☆1,317Updated this week
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆931Updated 3 months ago
- Checklist for container security - devsecops practices☆1,572Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,643Updated last week
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,094Updated 3 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆989Updated 6 months ago
- Identify privilege escalation paths within and across different clouds☆697Updated last month
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,231Updated last week
- Peirates - Kubernetes Penetration Testing tool☆1,320Updated last week
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆4,720Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,695Updated 8 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,183Updated 6 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,318Updated 3 months ago
- A curated list of threat modeling resources (Books, courses - free and paid, videos, tools, tutorials and workshops to practice on ) for …☆1,542Updated 9 months ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆4,783Updated this week
- Scan is a free & Open Source DevSecOps tool for performing static analysis based security testing of your applications and its dependenci…☆841Updated last year
- ☆662Updated this week
- Twitter vulnerable snippets☆1,009Updated 2 months ago
- Find security vulnerabilities, compliance issues, and infrastructure misconfigurations early in the development cycle of your infrastruct…☆2,304Updated this week
- 📚 A curated list of awesome Docker security resources☆673Updated 7 months ago
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆1,978Updated 5 months ago
- A tool for standing up (and tearing down!) purposefully insecure cloud infrastructure☆708Updated last year
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,262Updated 4 months ago
- A pentest reporting tool written in Python. Free yourself from Microsoft Word.☆1,384Updated 2 months ago