rung / training-devenv-security
Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"
☆44Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for training-devenv-security
- Trivy based vulnerability management service☆55Updated 4 months ago
- Serverless SOAR (Security Orchestration, Automation and Response) framework for automatic inspection and evaluation of security alert☆43Updated last year
- The Dirty Pipe Vulnerability☆46Updated 2 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆21Updated 7 months ago
- RustyBlue is a rust implementation of DeepblueCLI, a forensics log analyzer for finding evidence of compromise from windows event logs.☆68Updated 2 years ago
- Simple SQL Injection Lab: Hands-on guide and Docker setup for exploring MySQL and PostgreSQL injection techniques☆29Updated last year
- Kubernetes CTF☆43Updated 3 years ago
- TypeScript Scenario-Based Web Application Fuzzing Framework☆65Updated 2 years ago
- Integrated Security Testing Environment for Web Applications as Burp Extension.☆62Updated last year
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆129Updated last year
- RISKEN is a monitoring tool for visualizing security risks.☆21Updated last month
- A public cloud security knowledgebase - https://www.secwiki.cloud/☆48Updated 8 months ago
- Automatically update IoC for lucky visitor scam☆25Updated this week
- cheat sheet for penetration testing (Japanese) 🐉☆78Updated 3 years ago
- The tutorial of "Kubernetes Security for Microservices"☆14Updated last year
- ☆56Updated 6 months ago
- API client for crt.sh☆38Updated 3 years ago
- ONdemand csS injEctioN tool☆42Updated last year
- Core A2P2V functionality (command line based)☆67Updated 5 months ago
- ☆10Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆39Updated 10 months ago
- Ghidra Script for automated analysis of EMOTET☆17Updated 3 years ago
- Build a local copy of Known Exploited Vulnerabilities Catalog by CISA. Server mode for easy querying.☆18Updated last month
- Blogpost series showcasing interesting cloud - web app security bugs☆45Updated last year
- GCP cloud security CTF☆41Updated 7 months ago
- ペネトレーションテストについて☆72Updated 3 years ago
- ☆31Updated last year
- Archive of akictf Challenges☆57Updated 4 years ago
- ChaetSheet for Pwn Reversing of CTF☆32Updated 4 years ago