leaderdevops's repositories
adversary_emulation_library
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
attack-arsenal
A collection of red team and adversary emulation resources developed and released by MITRE.
awesome-iocs
A collection of sources of indicators of compromise.
AWS_IaC_pipeline_with_Security
An automated way to build IaC Pipeline on AWS with Security Fully Integrate
certified-kubernetes-administrator-course
Certified Kubernetes Administrator - CKA Course
cis-docker-benchmark
CIS Docker Benchmark - InSpec Profile
cis-kubernetes-benchmark
CIS Kubernetes Benchmark - InSpec Profile
clair
Vulnerability Static Analysis for Containers
Cloud-One-Workload-Security-AWS-SecurityHub
Custom integration Cloud One Workload Security with Security Hub
Cloud-One-Workload-Security-Slack-Notification
This is an Example for send events of Workload Security to Slack with SNS Integration.
cloudone-filestorage-plugins
Trend Micro Cloud One File Storage Security plugins reference code.
DeployC1CS-EKS-RDS
Passo a passo de como realizar o deploy o C1CS em EKS com um banco de dados Externo (RDS)
DetectionLab
Automate the creation of a lab environment complete with security tooling and logging best practices
docker-metasploit
Metasploit framework with steroids
DVWA
Damn Vulnerable Web Application (DVWA)
helm-charts
Curated applications for Kubernetes
JsonPath
Java JsonPath implementation
kubernetes-goat
Kubernetes Goat 🐐 is a "Vulnerable by Design" Kubernetes Cluster. Designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security 🔐
kubernetes-vagrant
Deploy a Kubernetes cluster using Vagrant.
smartcheck-docs
Documentation for Trend Micro Deep Security Smart Check.
smartcheck-helm
Helm chart to deploy Trend Micro Deep Security Smart Check.
smartcheck-samples
Sample code for integrating with Trend Micro Deep Security Smart Check.
talisman
By hooking into the pre-push hook provided by Git, Talisman validates the outgoing changeset for things that look suspicious - such as authorization tokens and private keys.
Voice_cloner
A guide to clone anyone's voice and use it as a text-to-speech with android
yara
The pattern matching swiss knife