-
Sysdig
- Italy
Lists (1)
Sort Name ascending (A-Z)
Stars
GitHub Actions Goat: Deliberately Vulnerable GitHub Actions CI/CD Environment
Customizable Linux Persistence Tool for Security Research and Detection Engineering.
ASN / RPKI validity / BGP stats / IPv4v6 / Prefix / URL / ASPath / Organization / IP reputation / IP geolocation / IP fingerprinting / Network recon / lookup API server / Web traceroute server
Fast and customizable vulnerability scanner based on simple YAML based DSL.
β DevSecOps Kubernetes Playground ("A Hacker's Guide to Kubernetes")
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
The Docker Bench for Security is a script that checks for dozens of common best-practices around deploying Docker containers in production.
An encyclopedia for offensive and defensive security knowledge in cloud native technologies.
Welcome to the Meta Threat Research Indicator Repository, a dedicated resource for the sharing of Indicators of Compromise (IOCs) and other threat indicators with the external research community
Terratest is a Go library that makes it easier to write automated tests for your infrastructure code.
π― T-Pot - The All In One Multi Honeypot Platform π
This publication is a collection of various common attack scenarios on Microsoft Entra ID (formerly known as Azure Active Directory) and how they can be mitigated or detected.
Azure Workload Identity full deployment with Terraform.
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
An evolving repository of CloudTrail events with detailed descriptions, MITRE ATT&CK insights, real-world incidents, references and security implications
Automating situational awareness for cloud penetration tests.
π π GuardDog is a CLI tool to Identify malicious PyPI and npm packages
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
A tool for exploring each layer in a docker image
The FLARE team's open-source tool to identify capabilities in executable files.