cider-security-research / cicd-goatView external linksLinks
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
☆2,197Jul 14, 2024Updated last year
Alternatives and similar repositories for cicd-goat
Users that are interested in cicd-goat are comparing it to the libraries listed below
Sorting:
- ☆422Jan 18, 2023Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,967May 20, 2025Updated 8 months ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,397Nov 18, 2025Updated 2 months ago
- Granular, Actionable Adversary Emulation for the Cloud☆2,252Feb 6, 2026Updated last week
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,475Updated this week
- game of active directory☆7,437Jul 16, 2025Updated 7 months ago
- Automating situational awareness for cloud penetration tests.☆2,289Feb 5, 2026Updated last week
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆912Oct 30, 2024Updated last year
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,855Oct 1, 2025Updated 4 months ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,065Updated this week
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆2,012Jul 12, 2025Updated 7 months ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,248Apr 12, 2024Updated last year
- GitHub Actions Pipeline Enumeration and Attack Tool☆726Sep 17, 2025Updated 4 months ago
- Adversary Emulation Framework☆10,673Feb 8, 2026Updated last week
- Azure Security Resources and Notes☆1,707Feb 2, 2026Updated 2 weeks ago
- Damn Vulnerable GraphQL Application is an intentionally vulnerable GraphQL service implementation designed for learning about and practis…☆1,672May 24, 2025Updated 8 months ago
- Peirates - Kubernetes Penetration Testing tool☆1,420Jan 20, 2026Updated 3 weeks ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆428Oct 29, 2024Updated last year
- Multi-Cloud Security Auditing Tool☆7,537Sep 23, 2025Updated 4 months ago
- Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.☆1,256Dec 9, 2025Updated 2 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,804Sep 17, 2024Updated last year
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,149Feb 9, 2026Updated last week
- Checklist for container security - devsecops practices☆1,611Sep 15, 2025Updated 5 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,473Dec 21, 2025Updated last month
- Small and highly portable detection tests based on MITRE's ATT&CK.☆11,570Feb 9, 2026Updated last week
- A collection of scripts for assessing Microsoft Azure security☆2,300Oct 29, 2025Updated 3 months ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,507Updated this week
- Automation for internal Windows Penetrationtest / AD-Security☆3,639Aug 28, 2025Updated 5 months ago
- PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)☆19,268Feb 4, 2026Updated last week
- Nuclei is a fast, customizable vulnerability scanner powered by the global security community and built on a simple YAML-based DSL, enabl …☆26,985Updated this week
- Find, verify, and analyze leaked credentials☆24,487Feb 7, 2026Updated last week
- Create your own vulnerable by design AWS penetration testing playground☆433Feb 6, 2026Updated last week
- Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud envir…☆12,983Updated this week
- Notes about attacking Jenkins servers☆2,090Jul 10, 2024Updated last year
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,167Nov 25, 2024Updated last year
- A python script to automatically coerce a Windows server to authenticate on an arbitrary machine through 12 methods.☆2,174Jan 5, 2026Updated last month
- Identify privilege escalation paths within and across different clouds☆714Feb 6, 2026Updated last week
- A collection of Azure AD/Entra tools for offensive and defensive security purposes☆2,515Feb 5, 2026Updated last week
- Azure Red Team tool for graphing Azure and Azure Active Directory objects☆1,685Jan 8, 2024Updated 2 years ago