thedojoseries / docker-ctfLinks
Repository for the OWASP DevSlop's Docker Game Day
☆19Updated last year
Alternatives and similar repositories for docker-ctf
Users that are interested in docker-ctf are comparing it to the libraries listed below
Sorting:
- OWASP Foundation Web Respository☆55Updated 2 years ago
- ☆12Updated 4 years ago
- a tool to audit the istio service mesh☆173Updated 3 years ago
- Modular Kubernetes lab which provides an easy and streamlined way to deploy a test cluster with support for different components.☆52Updated last year
- ☆34Updated 2 months ago
- ☆21Updated 2 months ago
- Labs for Threat Modelling training delivered by ControlPlane☆33Updated last year
- Clean accounts over permissions in GCP infra at scale☆71Updated 2 years ago
- Simple tool to identify and remediate the use of the AWS EC2 IMDSv1.☆16Updated 3 years ago
- PEACH - a step-by-step framework for modeling and improving SaaS and PaaS tenant isolation, by managing the attack surface exposed by use…☆71Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆29Updated 5 months ago
- ☆81Updated last week
- Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Security Management.☆31Updated 9 months ago
- In-depth and hands-on practice for acing the exam.☆15Updated last year
- ☆16Updated 2 years ago
- A set of AWS resources for testing the Log4Shell vulnerability, deployable with terraform☆12Updated 3 years ago
- Kubernetes Stranger Danger☆62Updated this week
- ☆12Updated 7 months ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆60Updated 3 years ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆68Updated 4 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 7 months ago
- A curated list of Software Component Analysis (SCA) books, courses - free and paid, videos, tools, and tutorials.☆107Updated 7 months ago
- Easy-to-use Threat modeling-as-a-Code (TaaC) solution following DevSecOps principles. Simple CI/CD integration as well as console usage. …☆65Updated 3 weeks ago
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆141Updated 3 months ago
- ☆99Updated 5 months ago
- Privilege escalation in Docker☆30Updated 3 years ago
- ☆42Updated 2 months ago
- A meta-database collecting resources that compile lists of breaches☆21Updated 8 months ago
- Threat Modeling (based on STRIDE approach) for Kubernetes systems.☆25Updated 9 months ago
- OWASP Kubernetes Security Testing Guide☆38Updated 10 months ago