snyk-labs / docker-goofLinks
A demo repo showcasing Snyk's Docker offering
☆32Updated 10 months ago
Alternatives and similar repositories for docker-goof
Users that are interested in docker-goof are comparing it to the libraries listed below
Sorting:
- Notes for the SCS-C01: AWS Certified Security - Specialty exam.☆13Updated last year
- The open source version of the AWS Security Hub documentation. To provide feedback or request changes, you can submit a pull request that…☆35Updated 2 years ago
- CloudSplaining on AWS Managed Policies☆43Updated this week
- Identify all permitted data paths originating from the Internet to Network Interfaces within AWS Accounts across the entire AWS Organizat…☆39Updated last year
- ☆14Updated 2 years ago
- ☆41Updated 4 months ago
- OWASP Foundation Web Respository☆35Updated 9 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Updated 3 years ago
- Lightspin AWS IAM Vulnerability Scanner☆96Updated 4 years ago
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- Hands-on workshop on how to build security automation in pipelines☆37Updated last year
- OWASP Foundation Web Respository☆10Updated 2 years ago
- AWS Certified Security Specialty (2020) course notes☆120Updated 4 years ago
- A walkthrough of security controls for a serverless architecture via a demo application☆11Updated 3 years ago
- Public repository of all things cloud security.☆41Updated 9 months ago
- Kubernetes Security Testing Guide☆26Updated last year
- ThreatModel for Amazon S3 - Library of all the attack scenarios on Amazon S3, and how to mitigate them following a risk-based approach☆153Updated last year
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Updated 3 years ago
- ☆41Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆101Updated last year
- sgCheckup generates nmap output based on scanning your AWS Security Groups for unexpected open ports.☆81Updated 3 years ago
- Vulnerable by Design AWS Cloud Development Kit (CDK) Infrastructure☆47Updated last year
- A toolset to juggle AWS roles for persistent access☆57Updated 10 months ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated last year
- Summaries, transcripts, key points, and other useful insights from AWS re:inforce 2025 talks for those of us who don't have time to watch…☆44Updated this week
- Tools that checks for misconfigured access to Github OIDC from AWS roles and GCP service accounts☆61Updated 2 years ago
- AWS SSO serverless phishing API.☆32Updated 3 years ago
- Scan your EC2 instance to find its vulnerabilities using Vuls (https://vuls.io/en/)☆88Updated 2 years ago
- ☆12Updated 4 years ago
- AWSATT&CK adds MITRE ATT&CK context and additional logging capabilities to Rhino Security Labs's open-source AWS exploitation framework, …☆45Updated 4 years ago