thedojoseries / docker-ctfLinks
Repository for the OWASP DevSlop's Docker Game Day
☆19Updated last year
Alternatives and similar repositories for docker-ctf
Users that are interested in docker-ctf are comparing it to the libraries listed below
Sorting:
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆34Updated last year
- ☆21Updated 3 months ago
- Curated list of security tools☆68Updated last year
- ☆12Updated 4 years ago
- In-depth and hands-on practice for acing the exam.☆15Updated last year
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆107Updated 9 months ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Updated 4 years ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆32Updated 10 months ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- book website☆71Updated 3 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 8 months ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆53Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 6 months ago
- OWASP Foundation Web Respository☆55Updated 2 years ago
- ☆102Updated 7 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆66Updated 3 months ago
- A deliberately vulnerable Kubernetes cluster☆128Updated last year
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 4 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆72Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆16Updated this week
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆187Updated 3 weeks ago
- Cloud Security Posture security policies☆32Updated 11 months ago
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- Kubernetes Stranger Danger☆64Updated last month
- CloudSplaining on AWS Managed Policies☆44Updated last week
- Decision trees generated via Graphviz to inform pragmatic threat modelling.☆11Updated 4 years ago