thedojoseries / docker-ctfLinks
Repository for the OWASP DevSlop's Docker Game Day
☆19Updated last year
Alternatives and similar repositories for docker-ctf
Users that are interested in docker-ctf are comparing it to the libraries listed below
Sorting:
- ☆27Updated 5 months ago
- A very vulnerable implementation of a GraphQL API.☆16Updated last week
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆30Updated 8 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆34Updated last year
- In-depth and hands-on practice for acing the exam.☆15Updated last year
- ☆12Updated 4 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆57Updated 10 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated 2 weeks ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- ☆102Updated 8 months ago
- ☆90Updated 4 months ago
- Demo repository for running eBPF in GitHub Actions☆22Updated 6 months ago
- ☆34Updated 2 months ago
- Capture The Flag Challenge for eBPF Summit 2022☆19Updated 3 years ago
- OWASP Foundation Web Respository☆56Updated 2 weeks ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- ☆21Updated 3 months ago
- ☆84Updated 3 months ago
- A deliberately vulnerable Kubernetes cluster☆129Updated last year
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆11Updated 3 years ago
- The Challenge for OWASP's Kubernetes CTF☆33Updated 2 years ago
- ☆44Updated last month
- ☆12Updated 10 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆108Updated 10 months ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆283Updated 2 years ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆189Updated last month
- Sample code snippets for consuming the CloudSploit API☆13Updated last year