octodemo / advanced-security-terraformView external linksLinks
Vulnerable Terraform Projects - Fork of https://github.com/bridgecrewio/terragoat
☆17Apr 23, 2024Updated last year
Alternatives and similar repositories for advanced-security-terraform
Users that are interested in advanced-security-terraform are comparing it to the libraries listed below
Sorting:
- Retrieves findings with APPROVED mitigations from an application's policy scan (or sandbox) and creates a baseline file for Pipeline Scan…☆10Jan 3, 2024Updated 2 years ago
- An AI-CyberSecurity Bot that assists security analysts in incident investigations☆40Feb 21, 2025Updated 11 months ago
- Easily plan & track time, costs, and budgets on work items.☆12Aug 30, 2019Updated 6 years ago
- Chef Fundamentals: A Recipe for Automating Infrastructure Udemy course resources including PDF's and code examples☆11Apr 15, 2020Updated 5 years ago
- https://breaches.cloud☆42Oct 16, 2024Updated last year
- Kernel CLI☆13Updated this week
- Resources from Power CAT☆21Updated this week
- A comprehensive framework and assessment toolkit for measuring and improving Cloud Native security maturity across 8 critical business fu…☆10Jun 24, 2025Updated 7 months ago
- Kotak Amal Pintar Menggunakan Sensor TCS3200 dan Telegram Bot☆10Jan 7, 2025Updated last year
- Remote Task Scheduler Enumeration☆13Jul 9, 2024Updated last year
- A technical blog about Kusto☆11Oct 31, 2025Updated 3 months ago
- A SBOM-centric security scanner.☆18Updated this week
- For Python ID X Traveloka Jakarta Spesial Kartini☆10Apr 20, 2018Updated 7 years ago
- Visual Studio Code extension for Azure Application Insights☆14Jan 31, 2017Updated 9 years ago
- Go module that returns supported regions for a service or supported services for a region☆18Dec 12, 2025Updated 2 months ago
- ansible course☆13Sep 7, 2023Updated 2 years ago
- ☆20Aug 20, 2025Updated 5 months ago
- Sumé LMS is a powerful microservice based solution for e-learning.☆10Feb 21, 2021Updated 4 years ago
- Sample code with security policies in Pulumi CrossGuard to implement preventive security checks in Infrastructure pipelines☆12Jan 4, 2023Updated 3 years ago
- A walkthrough of how a Kubernetes Pod can be exploited by a hacker☆11Aug 29, 2023Updated 2 years ago
- Sample code for Azure Communication Services iOS quickstarts☆13Nov 28, 2025Updated 2 months ago
- Install and configure git on your system.☆12Dec 17, 2025Updated 2 months ago
- domain information in JSON format☆10Jun 7, 2017Updated 8 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Oct 3, 2023Updated 2 years ago
- GitHub Stats is all about stars, forks, repos, followers and more☆12Dec 5, 2017Updated 8 years ago
- ☆11Jul 17, 2022Updated 3 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆15Aug 12, 2021Updated 4 years ago
- mitigation script by disabling ipv6 of all interfaces☆14Aug 15, 2024Updated last year
- Optimize the utilization of GHAS licenses in an enterprise (or organization)☆15Updated this week
- ☆11Oct 13, 2020Updated 5 years ago
- Create partitions, volume groups, volumes, filesystems and mounts☆13Dec 17, 2025Updated 2 months ago
- ☆10Jul 7, 2022Updated 3 years ago
- Orca Security - IaC Security GitHub Action☆14Feb 6, 2025Updated last year
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Ansible Playbook for provision a Graylog central logging server☆11Feb 24, 2017Updated 8 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Dec 20, 2021Updated 4 years ago
- Example application for CI/CD demonstrations of GitHub Actions deal with Docker, ECR, EKS and Helmfile☆19Jul 6, 2023Updated 2 years ago
- Generative Adversarial Networks Projects, published by Packt☆15Oct 5, 2019Updated 6 years ago
- ☆11Aug 28, 2016Updated 9 years ago