securekubernetes / cloud-shell-setupLinks
Bootstrapping setup for participants
☆10Updated 4 years ago
Alternatives and similar repositories for cloud-shell-setup
Users that are interested in cloud-shell-setup are comparing it to the libraries listed below
Sorting:
- Containerized pentesting tools☆45Updated 3 years ago
- unofficial fork of inetsim - official source at http://www.inetsim.org/ - changes in branch "pimped"☆29Updated 9 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 4 years ago
- Collection of Slides From My Conference Talks☆20Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 3 years ago
- Simple Docker Honeypot server emulating small snippets of the Docker HTTP API☆33Updated 5 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- Material from presentations done by GoSecure researchers☆34Updated 2 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆112Updated 6 years ago
- ☆60Updated 2 years ago
- Training scenarios for cyber ranges☆14Updated 5 years ago
- AWS EKS Cluster Forensics☆23Updated 4 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Updated 4 years ago
- ☆28Updated 5 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Updated 4 years ago
- Kubernetes Pwnage for all☆57Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Updated 5 years ago
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Updated 5 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆31Updated 3 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Updated 4 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 7 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Carving tool based in Radare2 & Yara☆17Updated 7 years ago