controlplaneio / threat-modelling-labsLinks
Labs for Threat Modelling training delivered by ControlPlane
☆34Updated last year
Alternatives and similar repositories for threat-modelling-labs
Users that are interested in threat-modelling-labs are comparing it to the libraries listed below
Sorting:
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- A collection of DoD and Federal Government Cloud Computing Resources☆48Updated 4 years ago
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆106Updated last year
- Compares and analyzes GCP IAM roles.☆77Updated 6 months ago
- CloudSplaining on AWS Managed Policies☆44Updated last month
- a tool to audit the istio service mesh☆173Updated 3 years ago
- ☆102Updated 8 months ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated this week
- Discover vulnerabilities and container image misconfiguration in production environments.☆56Updated last month
- Demos for several kubernetes security features☆64Updated 8 months ago
- OWASP Foundation Web Respository☆56Updated this week
- ☆41Updated 2 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 11 months ago
- This repo is a consolidation of Secure Software Supply Chain resources, such as talks, whitepapers, conferences and more.☆139Updated 3 years ago
- Useful scripts, Docker images, docker-compose apps, and Terraform modules.☆151Updated last week
- Threat model for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆157Updated 2 years ago
- Kubernetes Stranger Danger☆66Updated 3 weeks ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 11 months ago
- https://breaches.cloud☆42Updated 11 months ago
- ☆44Updated last month
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆209Updated 4 years ago
- ChaoSlingr: Introducing Security into Chaos Testing☆68Updated 6 years ago
- OWASP Kubernetes security and compliance tool [WIP]☆106Updated 2 years ago
- Test & Compare different Kubernetes security offerings on EKS, GKE and AKS☆40Updated last year
- ☆31Updated 11 months ago
- Examples on how to maintain security/compliance as code and to automate SecOps using the JupiterOne platform.☆54Updated last year
- For engineers and security teams driving fast and secure software supply chains☆83Updated 2 years ago
- Summaries, transcripts, key points, and other useful insights from fwd:cloudsec 2025 talks for those of us who don't have time to watch e…☆80Updated 3 months ago