Stars
Reverse Engineering: Decompiling Binary Code with Large Language Models
A deliberately vulnerable CI/CD environment. Learn CI/CD security through multiple challenges.
The repo containing scripts used in Blitzscaling security
GitHub Actions Pipeline Enumeration and Attack Tool
A centralized source of all AWS IAM privilege escalation methods released by Rhino Security Labs.
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
Cartography is a Python tool that consolidates infrastructure assets and the relationships between them in an intuitive graph view powered by a Neo4j database.
Curated list of project-based tutorials
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
Prowler is an Open Cloud Security tool for AWS, Azure, GCP and Kubernetes. It helps for continuos monitoring, security assessments and audits, incident response, compliance, hardening and forensics…
Master programming by recreating your favorite technologies from scratch.
CloudGoat is Rhino Security Labs' "Vulnerable by Design" AWS deployment tool