thedojoseries / docker-ctfLinks
Repository for the OWASP DevSlop's Docker Game Day
☆19Updated last year
Alternatives and similar repositories for docker-ctf
Users that are interested in docker-ctf are comparing it to the libraries listed below
Sorting:
- The Challenge for OWASP's Kubernetes CTF☆33Updated 2 years ago
- ☆16Updated 2 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- In-depth and hands-on practice for acing the exam.☆15Updated 11 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆64Updated 2 weeks ago
- A meta-database collecting resources that compile lists of breaches☆20Updated 7 months ago
- Offensive Terraform Website☆44Updated 4 years ago
- ☆12Updated 6 months ago
- Holds the public Hacking the Cloud CTFs.☆56Updated last year
- ☆12Updated 4 years ago
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆140Updated 2 months ago
- An extreme bootcamp to enable teams to build DevSecOps into their environment.☆9Updated 8 years ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆105Updated 6 months ago
- K8s Network Policy Migrator is a tool to migrate Calico or Cilium custom network policies to Kubernetes native network policy. The tool o…☆30Updated last year
- A small library to alter AWS API requests; Used for fuzzing research☆22Updated last year
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 3 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆21Updated 7 months ago
- Kubernetes security and vulnerability tools and utilities.☆56Updated 3 years ago
- A repository to store Rad Fingerprinting data.☆24Updated 10 months ago
- book website☆69Updated 3 years ago
- Labs for Threat Modelling training delivered by ControlPlane☆31Updated last year
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆55Updated 5 months ago
- K8s API Honeypot with Active Defense Capabilities☆40Updated last year
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Awesome resources about Security in Kubernetes☆42Updated 2 years ago