devsecops / defcon-workshopLinks
☆67Updated 8 years ago
Alternatives and similar repositories for defcon-workshop
Users that are interested in defcon-workshop are comparing it to the libraries listed below
Sorting:
- A More or less Random Collection of Scripts for security Testing.☆65Updated 3 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Testing/collecting some container breakouts☆94Updated 6 years ago
- Overview about existing tools that can be useful for AWS auditing purposes.☆15Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Updated 12 years ago
- Scan for and exploit Consul agents☆40Updated 6 years ago
- An AWS Lambda vulnerable application written in flask.☆49Updated 7 years ago
- All Day DevOps - Automated Infrastructure Security Monitoring and Defence (ELK + AWS Lambda)☆24Updated 8 years ago
- ☆14Updated 8 years ago
- Content for 'JIRA Risk Project' book published at LeanPub☆57Updated 7 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆165Updated 11 months ago
- ☆122Updated 7 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- Python module for evaluation of AWS account best practices around incident handling readieness.☆55Updated 5 years ago
- ☆89Updated 7 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 5 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 7 years ago
- A very vulnerable serverless application in AWS Lambda☆96Updated 5 years ago
- Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring☆126Updated 8 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- Conference talk slides and code☆11Updated 5 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- ☆25Updated 4 years ago
- A simple file-based scanner to look for potential AWS access and secret keys in files☆93Updated last year
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- AWS S3 Hacks☆78Updated 6 years ago