cider-security-research / cicd-goatLinks
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
☆2,175Updated last year
Alternatives and similar repositories for cicd-goat
Users that are interested in cicd-goat are comparing it to the libraries listed below
Sorting:
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,952Updated 7 months ago
- Automating situational awareness for cloud penetration tests.☆2,261Updated 2 weeks ago
- Checklist for container security - devsecops practices☆1,612Updated 3 months ago
- Vulnerable app with examples showing how to not use secrets☆1,382Updated this week
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,436Updated 2 weeks ago
- An encyclopedia for offensive and defensive security knowledge in cloud native technologies.☆2,455Updated 2 weeks ago
- Vulnerable REST API with OWASP top 10 vulnerabilities for security testing☆1,153Updated last year
- This is a step-by-step guide to implementing a DevSecOps program for any size organization☆2,022Updated last year
- vAPI is Vulnerable Adversely Programmed Interface which is Self-Hostable API that mimics OWASP API Top 10 scenarios through Exercises.☆1,318Updated 11 months ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,430Updated last month
- Awesome free cloud native security learning labs. Includes CTF, self-hosted workshops, guided vulnerability labs, and research labs.☆1,800Updated 3 months ago
- 🛡️ Awesome Cloud Security Resources ⚔️☆2,329Updated last year
- completely ridiculous API (crAPI)☆1,404Updated last week
- Granular, Actionable Adversary Emulation for the Cloud☆2,218Updated 3 weeks ago
- My cheatsheet notes to pentest AWS infrastructure☆699Updated 3 years ago
- The OWASP DevSecOps Guideline can help us to embedding security as a part of the development pipeline.☆997Updated 3 months ago
- ☆420Updated 2 years ago
- 📚 A curated list of awesome Docker security resources☆701Updated last month
- ♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎☆2,065Updated 3 weeks ago
- Identify privilege escalation paths within and across different clouds☆707Updated 2 weeks ago
- Peirates - Kubernetes Penetration Testing tool☆1,402Updated 4 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,776Updated last year
- API Security Project aims to present unique attack & defense methods in API Security field☆1,428Updated last year
- AzureGoat : A Damn Vulnerable Azure Infrastructure☆906Updated last year
- Practical resources for offensive CI/CD security research. Curated the best resources I've seen since 2021.☆563Updated 2 months ago
- dnsReaper - subdomain takeover tool for attackers, bug bounty hunters and the blue team!☆2,186Updated 3 months ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,931Updated 2 years ago
- Twitter vulnerable snippets☆1,082Updated 9 months ago
- Azure and AWS Attacks☆1,108Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆5,018Updated last month