swagitda / linux-cloud-native-security-101
Resources to learn about Linux, containers, k8s, and related security stuff
☆40Updated 3 years ago
Alternatives and similar repositories for linux-cloud-native-security-101:
Users that are interested in linux-cloud-native-security-101 are comparing it to the libraries listed below
- A command line security audit tool for Amazon Web Services☆81Updated 6 years ago
- ☆49Updated 4 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- A curated list of security tools for Hackers & Builders!☆99Updated 9 months ago
- ☆126Updated 9 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- 'Continuous' AWS perimeter monitoring: Periodically scan internet facing AWS resources to detect misconfigured services.☆64Updated 5 years ago
- a curated list of useful threat modeling resources☆133Updated 9 months ago
- 🖇️ STRIDE vs. ASVS equivalence table☆76Updated 8 months ago
- A deliberately vulnerable Kubernetes cluster☆124Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆60Updated 2 years ago
- IAMFinder enumerates and finds users and IAM roles in a target AWS account.☆111Updated 4 years ago
- A very vulnerable serverless application in AWS Lambda☆95Updated 5 years ago
- Pentester-focused Docker registry tool to enumerate and pull images☆108Updated 5 years ago
- A collection of 2020 artifacts describing the major pain points, vulnerabilities and concerns with Cloud Security.☆19Updated 4 years ago
- Awesome list of resources related to container security☆234Updated 4 months ago
- Cloud Security Dashboard for AWS - based on ScoutSuite☆1Updated last year
- ☆33Updated this week
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- Gordon is status check Github app to enforce and validate about.yaml file specifications in a repository during pull requests to drive co…☆20Updated 2 months ago
- Project intended to make Attack Maps part of software development by reducing the time it takes to complete them.☆48Updated 8 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- OWASP Cloud Security - Enabling conversations through threat and control stories☆180Updated 6 years ago
- OWASP Kubernetes Security Testing Guide☆37Updated 7 months ago
- ☆63Updated 2 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆103Updated 5 months ago
- Lab Material for the Two-Day Defending Modern DevOps Environments Course☆125Updated 5 years ago
- Updated incident response generator for training classes☆44Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 4 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆61Updated 3 years ago