A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
☆2,213Jul 14, 2024Updated last year
Alternatives and similar repositories for cicd-goat
Users that are interested in cicd-goat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆423Jan 18, 2023Updated 3 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,458Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,993May 20, 2025Updated 10 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,524Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,286Updated this week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- game of active directory☆7,610Mar 12, 2026Updated 2 weeks ago
- Automating situational awareness for cloud penetration tests.☆2,320Mar 10, 2026Updated 2 weeks ago
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆920Oct 30, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,917Oct 1, 2025Updated 5 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,110Updated this week
- GitHub Actions Pipeline Enumeration and Attack Tool☆739Updated this week
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,677May 24, 2025Updated 10 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,047Jul 12, 2025Updated 8 months ago
- Adversary Emulation Framework☆10,910Updated this week
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,268Apr 12, 2024Updated last year
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆436Oct 29, 2024Updated last year
- Azure Security Resources and Notes☆1,717Feb 17, 2026Updated last month
- Peirates - Kubernetes Penetration Testing tool☆1,429Jan 20, 2026Updated 2 months ago
- Multi-Cloud Security Auditing Tool☆7,585Sep 23, 2025Updated 6 months ago
- Find, verify, and analyze leaked credentials☆25,240Updated this week
- Checklist for container security - devsecops practices☆1,614Sep 15, 2025Updated 6 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,276Dec 9, 2025Updated 3 months ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,161Mar 8, 2026Updated 3 weeks ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,578Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,587Updated this week
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,387Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,490Dec 21, 2025Updated 3 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,808Sep 17, 2024Updated last year
- A curated list of awesome CI CD security resources☆810Mar 13, 2026Updated 2 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,192Nov 25, 2024Updated last year
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆497Jun 27, 2025Updated 9 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Notes about attacking Jenkins servers☆2,089Jul 10, 2024Updated last year
- Identify privilege escalation paths within and across different clouds☆719Feb 6, 2026Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,718Mar 18, 2026Updated last week
- A collection of scripts for assessing Microsoft Azure security☆2,338Mar 15, 2026Updated 2 weeks ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆554Mar 12, 2026Updated 2 weeks ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,652Aug 28, 2025Updated 7 months ago
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,358May 21, 2025Updated 10 months ago