null-open-security-community / swachalit
Swachalit - The null automation platform that hosts null.co.in.
☆20Updated last month
Alternatives and similar repositories for swachalit:
Users that are interested in swachalit are comparing it to the libraries listed below
- Kubernetes Security Testing Guide☆26Updated 9 months ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- This repo contains workshop material delivered at #nullcon2020☆15Updated 4 years ago
- Containerized pentesting tools☆45Updated 2 years ago
- Offensive Terraform module which copies publicly exposed EBS snapshot to us-east-1 region in attacker's AWS account and creates EBS volum…☆15Updated 4 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- ☆33Updated 4 years ago
- Virtual Security Operations Center☆50Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆75Updated 4 years ago
- A static website template for security pages.☆50Updated 5 months ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 2 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 3 years ago
- Puma Prey contains vulnerable .NET target applications to test the Puma Scan rules against. This project contains Web Forms, MVC5, and Co…☆21Updated 9 months ago
- A git submodule list containing all the tools repo's you'll ever need.☆28Updated 5 years ago
- This repository contain articles from around the web related to application security. It covers resources for Web , mobile and also nativ…☆12Updated 8 years ago
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- Open Security Summit 2018☆29Updated 4 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆14Updated 6 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Updated 6 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- Set of security tools that can be integrated in Jenkins pipelines.☆18Updated 5 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 2 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- WStalker: an easy proxy☆25Updated 4 years ago
- ☆14Updated 7 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 3 years ago
- notorious BIG IP☆15Updated 5 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Updated 3 years ago