Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
awesome-DevOpsSec
Archiving for DevOpsSec resources
https://github.com/zer0-kr/awesome-DevOpsSec
Last synced: 3 days ago
JSON representation
-
Resources
-
Documents
-
Workshops
-
Vulnerabilities
-
Challenges
-
etc
-
Blogs
-
Articles
- My AWS Pentest Methodology
- Detailed Analysis of CloudDon, Cloud Data Breach of Korea e-commerce company
- How I was able to access millions of ID cards on an e-commerce platform
- K8s Standard Architecture(2024)
- 15 Kubernetes Mistakes Side Effects Chart
- 15 Kubernetes Mistakes Side Effects Chart
- AWS IAM Privilege Escalation – Methods and Mitigation
- 15 Kubernetes Mistakes Side Effects Chart
- 15 Kubernetes Mistakes Side Effects Chart
-
Conferences
-
Trannings
-
-
Tools
-
AWS
- prowler - Security Vulnerability Scanner
- steampipe - zero-ETL solution for getting data directly from APIs and services
- CloudSploit - Cloud Security Posture Management(CSPM)
- pacu - AWS exploitation framework
- my-arsenal-of-aws-security-tools - List of open source tools for AWS security
- check_imds - IMDSv1 Scanner
-
Kubernetes
- Trivy - Find vulnerabilities, misconfigurations, secrets, SBOM in containers, Kubernetes
- kube-bench - Checks whether Kubernetes is deployed according to CIS Kubernetes Benchmark
- kube-hunter - Hunt for security weaknesses in Kubernetes clusters
- managed-kubernetes-auditing-toolkit - identifying common security issues in EKS
- Kubescape - Kubernetes security platform for your clusters, CI/CD pipelines, and IDE
- Falco - Cloud Native Runtime Security
- Clair - Vulnerability Static Analysis for Containers
-
Categories
Sub Categories
Keywords
security
9
kubernetes
7
devsecops
5
cloud
4
aws
4
azure
3
docker
3
security-tools
3
gcp
3
containers
3
dfir
2
terraform
2
cis-benchmark
2
incident-response
2
oci
2
mitre-attack
2
go
2
aws-security
2
golang
2
vulnerability-detection
2
devops
2
cspm
2
kubernetes-security
2
vulnerabilities
2
security-audit
2
python
2
cloud-security
2
cloud-native
2
iam
2
compliance
1
forensics
1
gdpr
1
hardening
1
blueteam
1
cloudsecurity
1
container
1
container-security
1
hacking
1
infrastructure
1
k8s
1
kubernetes-goat
1
owasp
1
pentesting
1
redteam
1
vulnerable-app
1
azure-security
1
gcp-security
1
goat
1
amitt
1
response-playbooks
1