A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
☆2,222Jul 14, 2024Updated last year
Alternatives and similar repositories for cicd-goat
Users that are interested in cicd-goat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆424Jan 18, 2023Updated 3 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,596Updated this week
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆2,000May 20, 2025Updated 10 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,541Updated this week
- Granular, Actionable Adversary Emulation for the Cloud☆2,292Apr 9, 2026Updated last week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- game of active directory☆7,691Mar 12, 2026Updated last month
- Automating situational awareness for cloud penetration tests.☆2,340Apr 12, 2026Updated last week
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆924Oct 30, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,933Oct 1, 2025Updated 6 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,136Mar 30, 2026Updated 2 weeks ago
- GitHub Actions Pipeline Enumeration and Attack Tool☆742Mar 26, 2026Updated 3 weeks ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,674May 24, 2025Updated 10 months ago
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,063Jul 12, 2025Updated 9 months ago
- Adversary Emulation Framework☆10,986Apr 10, 2026Updated last week
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Damn Vulnerable Rails app☆13Sep 20, 2012Updated 13 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,275Apr 12, 2024Updated 2 years ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆435Oct 29, 2024Updated last year
- Azure Security Resources and Notes☆1,734Feb 17, 2026Updated 2 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,439Jan 20, 2026Updated 2 months ago
- Multi-Cloud Security Auditing Tool☆7,625Sep 23, 2025Updated 6 months ago
- Find, verify, and analyze leaked credentials☆25,771Updated this week
- Checklist for container security - devsecops practices☆1,617Sep 15, 2025Updated 7 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,276Dec 9, 2025Updated 4 months ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,166Mar 8, 2026Updated last month
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,681Updated this week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl…☆27,896Updated this week
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,806Apr 6, 2026Updated last week
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆13,583Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,500Dec 21, 2025Updated 3 months ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,200Apr 7, 2026Updated last week
- A curated list of awesome CI CD security resources☆810Mar 13, 2026Updated last month
- Notes about attacking Jenkins servers☆2,091Jul 10, 2024Updated last year
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆502Jun 27, 2025Updated 9 months ago
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated 2 months ago
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,793Apr 6, 2026Updated last week
- A collection of scripts for assessing Microsoft Azure security☆2,344Mar 15, 2026Updated last month
- Automation for internal Windows Penetrationtest / AD-Security☆3,653Aug 28, 2025Updated 7 months ago
- Use Terraform to create your own vulnerable by design AWS IAM privilege escalation playground.☆562Mar 12, 2026Updated last month
- Villain is a high level stage 0/1 C2 framework that can handle multiple reverse TCP & HoaxShell-based shells, enhance their functionality…☆4,367May 21, 2025Updated 10 months ago