Block or Report
Block or report gowth4m
Contact GitHub support about this user’s behavior. Learn more about reporting abuse.
Report abuseStars
Language
Sort by: Recently starred
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
♾️ Collection and Roadmap for everyone who wants DevSecOps. Hope your DevOps are more safe 😎
Curated resources help you prepare for the CNCF/Linux Foundation CKS 2021 "Kubernetes Certified Security Specialist" Certification exam. Please provide feedback or requests by raising issues, or ma…
Tool to search secrets in various filetypes.
Turn (almost) any Python command line program into a full GUI application with one line
Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens that are already exploitable, so we can report them. We wis…
AWS Security Tools (AST) in a simple Docker container. 📦
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve…
A multi-platform bug bounty toolkit that can be installed on Debian/Ubuntu or set up with Docker.
A Docker container for remote penetration testing.
How to systematically secure anything: a repository about security engineering
Kubernetes Goat is a "Vulnerable by Design" cluster environment to learn and practice Kubernetes security using an interactive hands-on playground 🚀
A GitHub action to help you scan your docker image for vulnerabilities
Armory is a tool meant to take in a lot of external and discovery data from a lot of tools, add it to a database and correlate all of related information.
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Build Container Images In Kubernetes
A Microservices-based framework for the study of Network Security and Penetration Test techniques
Container Image Linter for Security, Helping build the Best-Practice Docker Image, Easy to start
Compilation of Resources from TCM's Windows Priv Esc Udemy Course
A curated list of security tools for Hackers & Builders!
Container introspection tool. Find out what container runtime is being used as well as features available.
The Complete Intro to Containers! As taught on Frontend Masters.
Course content, lab setup instructions and documentation of our very popular Breaking and Pwning Apps and Servers on AWS and Azure hands on training!
Web Security Checklist (Bug Bounty & Pentesting)
This was the steps and dockerfiles that were created during the Leap Day Twitch Stream