securekubernetes / cloud-shell-setup
Bootstrapping setup for participants
☆10Updated 3 years ago
Alternatives and similar repositories for cloud-shell-setup:
Users that are interested in cloud-shell-setup are comparing it to the libraries listed below
- A beginner-friendly CTF about Kubernetes security.☆77Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- ☆12Updated 2 months ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 7 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- ☆12Updated 3 years ago
- AWS EKS Cluster Forensics☆23Updated 3 years ago
- Modron - Cloud security compliance☆33Updated last month
- Repo to hold the markdown-ified metadata on AppSec tools that are automation-friendly☆12Updated 8 years ago
- Lazily wraps various Linux system auditing tools☆17Updated last year
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- ☆27Updated 2 months ago
- ☆28Updated 4 years ago
- Application Security Workflow Automation using Docker and Kubernetes☆22Updated 2 years ago
- Capture The Flag Challenge for eBPF Summit 2022☆18Updated 2 years ago
- Kubernetes Security Testing Guide☆26Updated 9 months ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- Carving tool based in Radare2 & Yara☆15Updated 6 years ago
- Offensive Terraform module which creates Kali Linux from the AWS marketplace and installs cloud security tools (Pacu, Cloudsplaining, Sco…☆18Updated 4 years ago
- Containerized pentesting tools☆45Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆19Updated 4 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago