michalkoczwara / DevSecOps-StudioLinks
Virtual environment for learning DevSecOps
☆36Updated 7 years ago
Alternatives and similar repositories for DevSecOps-Studio
Users that are interested in DevSecOps-Studio are comparing it to the libraries listed below
Sorting:
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- FastCVE: A Dockerized CVE search tool with API and CLI support for security vulnerability queries.☆53Updated last month
- automated tool designed to streamline the search and identification of Proofs of Concept (POCs)☆16Updated last year
- Application Security pipelines☆51Updated 3 years ago
- Automated privilege escalation of the world's most popular Docker images.☆67Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A penetration testing and vulnerability management application written using the powerful django framework.☆30Updated last year
- Jumpstart multiple WebSocket servers quickly☆32Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆27Updated 3 months ago
- An extension to use Semgrep inside Burp Suite.☆89Updated last month
- Prototype of Full Agentic Application Security Testing, FAAST = SAST + DAST + LLM agents☆57Updated 2 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Script to automate, when possible, the passive reconnaissance performed on a website prior to an assessment.☆37Updated last month
- Find CVE PoCs on GitHub☆147Updated last year
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- A collection of Semgrep rules which followed security guidelines for .NET and Java.☆23Updated 3 years ago
- ☆86Updated 2 months ago
- A multi-cloud DNS record scanner that aims to help cybersecurity/IT analysts identify dangling CNAME records in their cloud DNS services …☆49Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- REST-Attacker is designed as a proof-of-concept for the feasibility of testing generic real-world REST implementations. Its goal is to pr…☆80Updated 2 years ago
- Burp Suite Extension with MCP Server to enhance manual application security testing☆20Updated last month
- Cloud Exploit Framework☆114Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- ☆90Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆106Updated last month
- Virtual Security Operations Center☆51Updated last year
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆44Updated 2 years ago