modulexcite / attacking-and-auditing-docker-containers-and-kubernetes-clustersLinks
Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters
☆14Updated 5 years ago
Alternatives and similar repositories for attacking-and-auditing-docker-containers-and-kubernetes-clusters
Users that are interested in attacking-and-auditing-docker-containers-and-kubernetes-clusters are comparing it to the libraries listed below
Sorting:
- Virtual Security Operations Center☆50Updated last year
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- AWS Security Checks☆39Updated 7 years ago
- ☆21Updated 7 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- ☆28Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆14Updated 4 years ago
- ☆23Updated 2 years ago
- ☆57Updated 2 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆19Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 5 years ago
- Jenkins Security Research or Hacking Jenkins ;)☆11Updated 5 months ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- ☆51Updated 4 months ago
- ☆15Updated 4 years ago
- ☆10Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Updated 4 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- ☆24Updated 6 years ago
- Pivot into private VPC networks using a VPN connection☆42Updated 5 years ago
- Burp extension for quickly copying request/response data.☆29Updated last month
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- Security checks for your researches☆33Updated 4 years ago
- Tool to automate corporate network segmentation test☆19Updated 4 years ago
- Deployment code for ashirt-server☆19Updated last year
- Enumerate AWS permissions and resources.☆69Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 3 years ago
- retrive metadata endpoint data with these one liners.☆38Updated 4 years ago