devsecops / defcon-workshopLinks
☆68Updated 8 years ago
Alternatives and similar repositories for defcon-workshop
Users that are interested in defcon-workshop are comparing it to the libraries listed below
Sorting:
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- A More or less Random Collection of Scripts for security Testing.☆64Updated 3 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Conference talk slides and code☆11Updated 5 years ago
- ☆122Updated 7 years ago
- A very vulnerable serverless application in AWS Lambda☆98Updated 6 years ago
- ☆61Updated 7 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- ☆90Updated 8 years ago
- Security Payload Unit Test Repository (SPUTR)☆86Updated 2 years ago
- Continuous Integration and Development ExploiteR☆87Updated 3 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- Welcome to OpenDevSecOps! Our mission is to deliver highly-resilient, readily-available and free defensive and offensive devops security …☆21Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 8 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆25Updated 9 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 7 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Updated last year
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆145Updated 2 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- Scan for and exploit Consul agents☆39Updated 6 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Updated 6 years ago
- Proof of Concept Zappa Based AWS Persistence and Attack Platform☆40Updated 5 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago