Tagged: ethical hacking

Kubernetes-Goat – Is A "Vulnerable By Design" Kubernetes Cluster. Designed To Be An Intentionally Vulnerable Cluster Environment To Learn And Practice Kubernetes Security 0

Kubernetes-Goat – Is A "Vulnerable By Design" Kubernetes Cluster. Designed To Be An Intentionally Vulnerable Cluster Environment To Learn And Practice Kubernetes Security

  The Kubernetes Goat is designed to be an intentionally vulnerable cluster environment to learn and practice Kubernetes security. Refer to https://madhuakula.com/kubernetes-goat for the guide. Show us some Please feel free to send us...

Gotanda – Browser Web Extension For OSINT 0

Gotanda – Browser Web Extension For OSINT

Gotanda is OSINT(Open Source Intelligence) Web Extension for Firefox/Chrome. This Web Extension could search OSINT information from some IOC in web page.(IP,Domain,URL,SNS…etc) This Repository partly the studying and JavaScript practice. Download link below. FireFox...

Abaddon – Make red team operations faster, more repeatable, stealthier, while including value-added tools and bringing numerous reporting capabilities 0

Abaddon – Make red team operations faster, more repeatable, stealthier, while including value-added tools and bringing numerous reporting capabilities

Red team operations involve miscellaneous skills, last several months and are politically sensitive; they require a lot of monitoring, consolidating and caution. Wavestone’s red team operations management software, Abaddon, has been designed to make...