rung / training-devenv-security
Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"
☆46Updated 2 years ago
Alternatives and similar repositories for training-devenv-security:
Users that are interested in training-devenv-security are comparing it to the libraries listed below
- Trivy based vulnerability management service☆55Updated last month
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆47Updated last year
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆30Updated 2 years ago
- The Dirty Pipe Vulnerability☆47Updated 3 years ago
- Generator of static files(csv, jpeg, png, pdf) for testing file upload. It can generate csv and png files of any number of bytes!☆66Updated 2 months ago
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated last week
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆63Updated 2 years ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆72Updated 2 years ago
- Kubernetes CTF☆43Updated 4 years ago
- ☆11Updated 4 years ago
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 3 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Updated last year
- Prompt Hardener is a tool designed to evaluate and enhance the securify of system prompts for RAG systems.☆16Updated 4 months ago
- Decentralized Cyber Threat Intelligence Kaizen Framework☆26Updated 3 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆19Updated 2 weeks ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆133Updated 3 weeks ago
- 脆弱性トリアージガイドライン作成の手引き☆27Updated 3 months ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆23Updated last week
- Ghidra Script for automated analysis of EMOTET☆17Updated 4 years ago
- cheat sheet for penetration testing (Japanese) 🐉☆81Updated 4 years ago
- This is the LLM integration app that contains the vulnerability; please use it to verify the vulnerability of the LLM integration app.☆55Updated 2 months ago
- Japanese translation of "The Elevation of Privilege Threat Modeling Game"☆42Updated 4 years ago
- 脆弱性報奨金制度に関する詳細文書を保管するレポジトリです☆35Updated 3 weeks ago
- API client for crt.sh☆41Updated 4 years ago
- ☆10Updated last year
- Event forwarder for CrowdStrike Falcon☆11Updated last year
- CVEs <--> Metasploit-Framework modules☆24Updated last week
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆51Updated 5 months ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆40Updated last year
- Automatically update IoC for lucky visitor scam☆26Updated 2 weeks ago