rung / training-devenv-securityView external linksLinks
Hands-on Exercises for "Dangerous attack paths: Modern Development Environment Security - Devices and CI/CD pipelines"
☆45Sep 19, 2022Updated 3 years ago
Alternatives and similar repositories for training-devenv-security
Users that are interested in training-devenv-security are comparing it to the libraries listed below
Sorting:
- ☆20Feb 9, 2024Updated 2 years ago
- LLVM-based ROP obfuscated compiler☆13Mar 24, 2022Updated 3 years ago
- GoTEE - example application☆16Updated this week
- python3によるblock chaineによる公文書などの改竄がないことの保証の例です☆12Feb 10, 2022Updated 4 years ago
- Go Conference mini 2022 Autumn IN SENDAI のトーク「認知的複雑度から見るGo言語のイベントソーシング実装」のサンプルコードです。☆12Jan 29, 2023Updated 3 years ago
- VSCode extension to detect vulnerable regular expressions☆13Jan 14, 2024Updated 2 years ago
- Send GKE audit events to falco☆12Jan 8, 2023Updated 3 years ago
- ☆11Jul 12, 2023Updated 2 years ago
- Python Scenario-Based OpenID Connect Testing Tool☆38Dec 8, 2023Updated 2 years ago
- ☆38Jan 7, 2025Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Nov 2, 2023Updated 2 years ago
- A strongly typed infrastructure management tool☆43Updated this week
- ☆21Jun 30, 2025Updated 7 months ago
- ☆21Sep 23, 2025Updated 4 months ago
- AWS Testing and Reporting Management Tool☆20Jan 23, 2023Updated 3 years ago
- Gathers most appreciated Linux debugging methods in a step by step manual.☆20Oct 4, 2019Updated 6 years ago
- A comprehensive, systematic and actionable way to understand attacker behaviors and techniques with respect to the software supply chain☆97Feb 11, 2025Updated last year
- Stack-based Buffer Overflow - Vulnerable binaries and exploit samples for pwnable beginners☆18Jun 24, 2021Updated 4 years ago
- Generate Terraform HCL files from existng GKE resources☆26Oct 23, 2018Updated 7 years ago
- Simple SOAR (Security Orchestration, Automation and Response) framework integrated with OPA/Rego☆24Jul 7, 2025Updated 7 months ago
- Sharing Threat Hunting runbooks☆25Jul 5, 2019Updated 6 years ago
- PAWNYABLE!☆234May 30, 2024Updated last year
- ☆28Apr 14, 2023Updated 2 years ago
- ☆16Sep 22, 2024Updated last year
- Example repository for GitHub Actions Time of Check to Time of Use (TOCTOU vulnerabilities)☆35Jan 25, 2026Updated 2 weeks ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- シェルスクリプトからGo言語への変換をサポートする問題集です。あくまで参考実装です。☆28Mar 3, 2025Updated 11 months ago
- ☆28Aug 6, 2020Updated 5 years ago
- Executive coaching skill for planning your 2026 using research-backed process goals. Works with Claude Code and Claude.ai.☆25Jan 5, 2026Updated last month
- Azure AD Identity Protection Cookie Spoofing☆35Sep 2, 2023Updated 2 years ago
- Guide to setup GKE multi-cluster container native load balancing☆10May 23, 2020Updated 5 years ago
- CloudPathSniffer is an open-source, easy to use and extensible Cloud Anomaly Detection platform designed to help security teams to find h…☆13Nov 30, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- GCP CSPM using Google Sheets☆38Apr 4, 2025Updated 10 months ago
- FARO - Document Sensitivity Detector☆10Sep 30, 2022Updated 3 years ago
- 结合chrome-devtools-mcp的能力并加上Skill的规范,实现JSRPC+Flask+autoDecoder方案的前端JS逆向自动化分析,提升JS逆向的效率☆21Updated this week
- Threat matrix for CI/CD Pipeline☆760Jul 8, 2024Updated last year
- GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment☆494Jun 27, 2025Updated 7 months ago
- Solutions to Modern Compiler Implementation in ML 🐯☆10May 24, 2017Updated 8 years ago