Container Security and Serverless Training
☆13Dec 8, 2022Updated 3 years ago
Alternatives and similar repositories for container_training
Users that are interested in container_training are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- Serverless Workshop☆16Dec 8, 2022Updated 3 years ago
- Intentionally Vulnerable Flask app for use in Demos☆33Feb 7, 2026Updated 2 months ago
- Bash one-liners for great justice!☆12Feb 9, 2019Updated 7 years ago
- Research Links for LLM Security☆17May 27, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A unified DevSecOps Framework that allows you to go from iterative, collaborative Threat Modeling to Application Security Test Orchestrat…☆281Feb 17, 2026Updated 2 months ago
- Tool to generate info for the AWS penetration testing request form☆19Oct 21, 2016Updated 9 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Automating SQL injection using Burp Proxy Logs and SQLMap☆27Jul 6, 2012Updated 13 years ago
- Scripts to automate Veracode security scans☆16Aug 13, 2013Updated 12 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Recent Fuzzing Paper☆36Jul 25, 2023Updated 2 years ago
- ☆14Dec 3, 2022Updated 3 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- We borrow the concept of 'personas' from UX/service design and apply it to threat actors to improve understanding between security, techn…☆11Jun 17, 2020Updated 5 years ago
- Result files from various fuzzing runs☆16Oct 18, 2021Updated 4 years ago
- ☆16Jul 20, 2017Updated 8 years ago
- CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to …☆12Jan 1, 2024Updated 2 years ago
- Semgrep rules corresponding to the OWASP ASVS standard☆27Nov 2, 2020Updated 5 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆18Dec 28, 2017Updated 8 years ago
- Kernel Stack info leak at exportObjectToClient function☆42May 21, 2019Updated 6 years ago
- This repo hosts Terraform code for generating and analyzing Software Bill of Materials (SBOM) for Amazon ECR images. It helps identify Am…☆16Oct 18, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Burp extension to use updated token values, such as a bearer token☆24Dec 2, 2022Updated 3 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆24Oct 29, 2020Updated 5 years ago
- experimental threat modeling tools☆14Oct 7, 2022Updated 3 years ago
- An example app for a tutorial.☆19Jul 30, 2016Updated 9 years ago
- Practical Web Penetration Testing, published by Packt☆26Jan 30, 2023Updated 3 years ago
- Intentionally Vulnerable Serverless Functions to understand the specifics of Serverless Security Vulnerabilities☆136Dec 8, 2022Updated 3 years ago
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- Kubernetes Scanner☆40Feb 14, 2022Updated 4 years ago
- Attempts to determine the configuration, behavior, and type of a remote MQTT broker☆16Mar 26, 2019Updated 7 years ago
- C definitions processor.☆22Feb 3, 2018Updated 8 years ago
- A tool for automatic black-box detection of missing hostname verification, including for applications that use certificate pinning.☆19Feb 13, 2019Updated 7 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- ☆11Feb 25, 2023Updated 3 years ago