rung / training-devenv-securityLinks
Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"
☆45Updated 3 years ago
Alternatives and similar repositories for training-devenv-security
Users that are interested in training-devenv-security are comparing it to the libraries listed below
Sorting:
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆51Updated 2 years ago
- Trivy based vulnerability management service☆56Updated 3 weeks ago
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆63Updated 2 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 3 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Updated 2 years ago
- Prompt Hardener is an open-source tool that evaluates and strengthens system prompts used in LLM-based applications.☆40Updated last week
- Kubernetes CTF☆43Updated 2 months ago
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆67Updated last month
- The Dirty Pipe Vulnerability☆46Updated 3 years ago
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆31Updated 2 years ago
- cheat sheet for penetration testing (Japanese) 🐉☆83Updated 4 years ago
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆67Updated 9 months ago
- ☆10Updated 2 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆140Updated 3 weeks ago
- TypeScript Scenario-Based Web Application Fuzzing Framework☆64Updated 3 years ago
- ☆26Updated 2 years ago
- API client for crt.sh☆41Updated 4 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆23Updated last week
- RISKEN is a monitoring tool for visualizing security risks.☆23Updated 2 months ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Updated 4 months ago
- ☆66Updated 3 months ago
- Phishing URL dataset from JPCERT/CC☆195Updated last week
- ☆155Updated last month
- AI Powered Scanner across multiple languages including IaC (formaly vulnhuntrs)☆38Updated 2 months ago
- AI-powered security alert management that reduces noise and accelerates response time☆73Updated this week
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆192Updated 11 months ago
- Scan your account for the use of untrusted AMIs☆30Updated 3 months ago
- Cloud agnostic IAM permissions enumerator☆160Updated 7 months ago
- Archive of akictf Challenges☆60Updated 5 years ago
- Deadshot is a Github pull request scanner to identify sensitive data being committed to a repository☆191Updated last year