A deliberately vulnerable Kubernetes cluster
☆132Dec 15, 2023Updated 2 years ago
Alternatives and similar repositories for kube-goat
Users that are interested in kube-goat are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- A curated list of awesome Kubernetes security resources☆958Dec 15, 2023Updated 2 years ago
- Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on p…☆5,596Updated this week
- Attacking and Defending Kubernetes Clusters: A Guided Tour☆213Aug 18, 2021Updated 4 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- ☆84May 1, 2023Updated 2 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Asset inventory of over 800 public bug bounty programs.☆12Jun 12, 2023Updated 2 years ago
- A python script to create a fake GitHub runner and hijack pipeline jobs to leak CI/CD secrets.☆29Oct 13, 2024Updated last year
- Kubernetes Easter CTF☆59Jul 10, 2020Updated 5 years ago
- CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool☆3,541Updated this week
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆47Updated this week
- Illustrations of codeql's AST☆12Sep 10, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Scripts and tools for AWS Pentest☆53Oct 22, 2020Updated 5 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆985Sep 2, 2024Updated last year
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆136Apr 28, 2020Updated 5 years ago
- RBAC in Kubernetes visualizer☆24Jun 11, 2019Updated 6 years ago
- Practice Labs☆104Dec 10, 2020Updated 5 years ago
- A curated list for Awesome Kubernetes Security resources☆1,998Updated this week
- ☆14Sep 22, 2019Updated 6 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Sep 11, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Dec 10, 2022Updated 3 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the token☆27Dec 1, 2022Updated 3 years ago
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 10 months ago
- A JRuby implementation of the BurpExtender interface for PortSwigger Burp Suite. Not currently maintained -- see tduehr/buby☆28Apr 30, 2011Updated 14 years ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆291Apr 10, 2023Updated 3 years ago
- This repository contains the research and components of our research into using Sigma for AWS Incident Response.☆31Jul 12, 2023Updated 2 years ago
- Repository for dirty scripts and PoCs☆20Feb 18, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A simple AWS Boto3 script to trigger EBS Snapshots using Lambda Functions🎓☆21Apr 5, 2021Updated 5 years ago
- OWASP Kubernetes Security Testing Guide☆42Dec 22, 2025Updated 3 months ago
- Sysmon config for both Windows and Linux Devices. Windows one is a bit dated☆55Jul 10, 2024Updated last year
- A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.☆2,222Jul 14, 2024Updated last year
- A golang library designed to interact with Metasploit☆43Mar 27, 2021Updated 5 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Damn Vulnerable C# Application (API)☆80Jul 15, 2024Updated last year