Pinned Repositories
API-Security-Checklist
Checklist of the most important security countermeasures when designing, testing, and releasing your API
Awesome-Hacking
A collection of various awesome lists for hackers, pentesters and security researchers
awesome-iot-hacks
A Collection of Hacks in IoT Space so that we can address them (hopefully).
datasploit
A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitoring on the data.
DevSecOps
ExtAnalysis
Browser Extension Analysis Framework - Scan, Analyse Chrome, firefox and Brave extensions for vulnerabilities and intels
photoVideos
python-burp-rest-api
Python Package for burprestapi
WhoisIP
This takes list of IP Addresses from test.txt file to collect information and generate .csv file.
archerysec
ASOC, ASPM, DevSecOps, Vulnerability Management Using ArcherySec.
anandtiwarics's Repositories
anandtiwarics/photoVideos
anandtiwarics/DevSecOps
anandtiwarics/cloud-sec-wiki
Jekyll Files for cloudsecwiki.com
anandtiwarics/openvas_lib
OpenVAS connector for versions 6, 7, 8 and 9
anandtiwarics/terraform-aws-waf-webaclv2
Terraform module to configure WAF WebACL V2 for Application Load Balancer
anandtiwarics/anandtiwarics
anandtiwarics/anmol098
If you are forking please do not forget to star the repo
anandtiwarics/attacking-and-auditing-docker-containers-and-kubernetes-clusters
Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters
anandtiwarics/awesome-aws-workshops
Unofficial curated list of awesome workshops found around in the internet. As we all have been there, finding that workshop that you have just attended shouldn't be hard. The idea is to provide an easy central repository, in a collaborative way.
anandtiwarics/aws-inventory
Discover resources created in an AWS account.
anandtiwarics/certified-kubernetes-administrator-cka-exam
Resources to prepare for the Certified Kubernetes Administrator exam
anandtiwarics/CKA-practice-exercises
This is a guide for passing the CNCF Certified Kubernetes Administrator (CKA) with practice exercises. Good luck!
anandtiwarics/CKA-StudyGuide
Study guide for the CKA exam
anandtiwarics/devops
Blogseries on DevOps
anandtiwarics/dvka
Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.
anandtiwarics/fierce-sage
anandtiwarics/hoverboard
Conference website template
anandtiwarics/hugo-book
Hugo documentation theme as simple as plain book
anandtiwarics/kappa
What precedes Lambda
anandtiwarics/kube_security_lab
anandtiwarics/Kubernetes-Certified-Administrator
Online resources that will help you prepare for taking the CNCF CKA "Kubernetes Certified Administrator" Certification exam. with time, This is not likely the comprehensive up to date list - please make a pull request if there something that should be added here.
anandtiwarics/my-arsenal-of-aws-security-tools
List of open source tools for AWS security: defensive, offensive, auditing, DFIR, etc.
anandtiwarics/prisma-cloud-docs
Prisma Cloud docs
anandtiwarics/secure-pipeline-java-demo
anandtiwarics/steampipe
Use SQL to instantly query your cloud services (AWS, Azure, GCP and more). Open source CLI. No DB required.
anandtiwarics/steampipe-mod-aws-compliance
Run individual controls or full compliance benchmarks for CIS, PCI, NIST, HIPAA and more across all of your AWS accounts using Steampipe.
anandtiwarics/supply-chain-security-gateway
Reference architecture and proof of concept implementation for supply chain security gateway
anandtiwarics/terminals-are-sexy
💥 A curated list of Terminal frameworks, plugins & resources for CLI lovers.
anandtiwarics/tools.tldr.run
Curated list of security tools for Hackers & Builders!
anandtiwarics/very-vulnerable-serverless
Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless application that serves as a testing environment for security professionals to learn lambda pentesting. The application is designed to demonstrate various security vulnerabilities that can be found in serverless application