AzureGoat
Cloud simulator
A vulnerable Azure infrastructure simulator used to demonstrate and practice cloud security vulnerabilities
AzureGoat : A Damn Vulnerable Azure Infrastructure
801 stars
11 watching
186 forks
Language: Python
last commit: 4 months ago
Linked from 3 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
| A vulnerable cloud infrastructure demonstrating common web application security risks and misconfigurations | 364 |
| An AWS deployment tool designed to provide intentionally vulnerable cloud infrastructure for hands-on learning and penetration testing. | 2,991 |
| A vulnerable AWS infrastructure designed to test and demonstrate common web application security risks | 1,760 |
| A training project that demonstrates how common configuration errors can be introduced into cloud infrastructure to test secure development best practices | 1,159 |
| A tool for creating and managing vulnerable environments in cloud computing platforms. | 269 |
| A penetration testing tool designed to simulate real-world web application vulnerabilities. | 69 |
| A collaboration to create realistic test environments for simulating real-world attacks and improving detection strategies. | 704 |
| An environment to learn about OWASP Top 10 security risks in Node.js web applications | 1,895 |
| An educational web application designed to demonstrate common web security flaws and their countermeasures. | 226 |
| Automated attack simulation framework for cloud environments | 535 |
| A training project demonstrating how common configuration errors can lead to production cloud environment issues | 92 |
| A multi-cloud deployment tool designed to test and demonstrate the vulnerability of cloud infrastructure configurations | 541 |
| An adversary emulation platform used to test and improve network security defenses by simulating malware infections | 6,697 |
| A toolset providing vulnerable cloud infrastructure as code to analyze and secure infrastructure-as-code threats | 96 |
| An Android app designed to demonstrate common web application vulnerabilities and provide training in secure coding practices. | 10 |