leaderdevops's repositories

adversary_emulation_library

An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.

Language:CLicense:Apache-2.0Stargazers:1Issues:0Issues:0
Language:ShellStargazers:1Issues:0Issues:0
Stargazers:0Issues:0Issues:0

attack-arsenal

A collection of red team and adversary emulation resources developed and released by MITRE.

License:Apache-2.0Stargazers:0Issues:0Issues:0

awesome-iocs

A collection of sources of indicators of compromise.

License:NOASSERTIONStargazers:0Issues:0Issues:0

AWS_IaC_pipeline_with_Security

An automated way to build IaC Pipeline on AWS with Security Fully Integrate

Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

certified-kubernetes-administrator-course

Certified Kubernetes Administrator - CKA Course

Stargazers:0Issues:0Issues:0

cis-docker-benchmark

CIS Docker Benchmark - InSpec Profile

License:Apache-2.0Stargazers:0Issues:0Issues:0

cis-kubernetes-benchmark

CIS Kubernetes Benchmark - InSpec Profile

License:Apache-2.0Stargazers:0Issues:0Issues:0

clair

Vulnerability Static Analysis for Containers

License:Apache-2.0Stargazers:0Issues:0Issues:0

Cloud-One-Workload-Security-AWS-SecurityHub

Custom integration Cloud One Workload Security with Security Hub

Stargazers:0Issues:0Issues:0

Cloud-One-Workload-Security-Slack-Notification

This is an Example for send events of Workload Security to Slack with SNS Integration.

Stargazers:0Issues:0Issues:0

cloudone-filestorage-plugins

Trend Micro Cloud One File Storage Security plugins reference code.

License:Apache-2.0Stargazers:0Issues:0Issues:0
Stargazers:0Issues:0Issues:0

DeployC1CS-EKS-RDS

Passo a passo de como realizar o deploy o C1CS em EKS com um banco de dados Externo (RDS)

Stargazers:0Issues:0Issues:0

DetectionLab

Automate the creation of a lab environment complete with security tooling and logging best practices

License:MITStargazers:0Issues:0Issues:0

docker-metasploit

Metasploit framework with steroids

License:GPL-3.0Stargazers:0Issues:0Issues:0

DVWA

Damn Vulnerable Web Application (DVWA)

License:GPL-3.0Stargazers:0Issues:0Issues:0
Language:JavaStargazers:0Issues:0Issues:0

helm-charts

Curated applications for Kubernetes

Stargazers:0Issues:0Issues:0

JsonPath

Java JsonPath implementation

License:Apache-2.0Stargazers:0Issues:0Issues:0

kubernetes-goat

Kubernetes Goat 🐐 is a "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🔐

License:MITStargazers:0Issues:0Issues:0

kubernetes-vagrant

Deploy a Kubernetes cluster using Vagrant.

Stargazers:0Issues:0Issues:0

smartcheck-docs

Documentation for Trend Micro Deep Security Smart Check.

Stargazers:0Issues:0Issues:0

smartcheck-helm

Helm chart to deploy Trend Micro Deep Security Smart Check.

License:NOASSERTIONStargazers:0Issues:0Issues:0

smartcheck-samples

Sample code for integrating with Trend Micro Deep Security Smart Check.

License:Apache-2.0Stargazers:0Issues:0Issues:0

talisman

By hooking into the pre-push hook provided by Git, Talisman validates the outgoing changeset for things that look suspicious - such as authorization tokens and private keys.

License:MITStargazers:0Issues:0Issues:0

Voice_cloner

A guide to clone anyone's voice and use it as a text-to-speech with android

License:Apache-2.0Stargazers:0Issues:0Issues:0

yara

The pattern matching swiss knife

License:BSD-3-ClauseStargazers:0Issues:0Issues:0