metarget
Cloud Native Vulnerability Generator
A framework for automating the construction of vulnerable cloud-native infrastructure
Metarget is a framework providing automatic constructions of vulnerable infrastructures.
1k stars
18 watching
171 forks
Language: Python
last commit: 4 months ago
Linked from 2 awesome lists
cloud-nativecloud-native-securitycontainercontainer-escapecontainer-securitykernel-exploitationkuberneteskubernetes-securityprivilege-escalationtargetvulnerabilitiesvulnerable-infrastructurevulnerable-infrastructuresvulnerable-scenes
Related projects:
Repository | Description | Stars |
---|---|---|
| A training project that demonstrates how common configuration errors can be introduced into cloud infrastructure to test secure development best practices | 1,159 |
| An AWS deployment tool designed to provide intentionally vulnerable cloud infrastructure for hands-on learning and penetration testing. | 2,991 |
| A training project demonstrating how common configuration errors can lead to production cloud environment issues | 92 |
| A tool for creating and managing vulnerable environments in cloud computing platforms. | 269 |
| A tool designed to manipulate and control Kubernetes clusters after initial penetration and privilege escalation. | 281 |
| Lists publicly disclosed vulnerabilities in various cloud services. | 357 |
| Automates the creation of vulnerable web applications for testing and security research purposes. | 84 |
| A collection of Rust libraries for working with vulnerability data from various sources. | 17 |
| A Python-based web application honeypot that simulates common web application vulnerabilities to detect and analyze potential threats. | 564 |
| A vulnerable Azure infrastructure simulator used to demonstrate and practice cloud security vulnerabilities | 801 |
| Checks AWS accounts for subdomain hijacking vulnerabilities | 84 |
| A toolset providing vulnerable cloud infrastructure as code to analyze and secure infrastructure-as-code threats | 96 |
| A proof of concept project demonstrating a remote code execution vulnerability in Apache Solr via deserialization of untrusted data | 209 |
| Demonstrates how common configuration errors can lead to production cloud misconfigurations | 44 |
| A framework for creating environmental keyed payloads | 740 |