CI/CD Goat Logo

CI/CD Goat

0
Free
Visit Website

The CI/CD Goat project allows engineers and security practitioners to learn and practice CI/CD security through a set of 11 challenges, enacted against a real, full blown CI/CD environment. The scenarios are of varying difficulty levels, with each scenario focusing on one primary attack vector. The challenges cover the Top 10 CI/CD Security Risks, including Insufficient Flow Control Mechanisms, PPE (Poisoned Pipeline Execution), Dependency Chain Abuse, PBAC (Pipeline-Based Access Controls), and more. The different challenges are inspired by Alice in Wonderland, each one is themed as a different character. The project’s environment is based on Docker containers and can be run locally. These containers are: Gitea (minimal git server), Jenkins, Jenkins agent, LocalStack (cloud service emulator that runs in a single container), and Prod (contains Docker in Docker and Lighttpd service).

FEATURES

ALTERNATIVES

A comprehensive SQL injection cheat sheet covering various database management systems and techniques.

Comprehensive security training platform for web developers, offering hands-on experience with real, vulnerable applications and concrete advice for securing code.

A newsletter providing summarized cyber defense technical content for blue and purple teams to stay informed and protect their estates.

A condensed field guide for cyber security incident responders, covering incident response processes, attacker tactics, and practical techniques for handling incidents.

A collection of reports and resources highlighting Android security vulnerabilities and best practices.

A university course focused on vulnerability research, reverse engineering, and binary exploitation to teach practical offensive security skills.

Live and on-demand cybersecurity training programs for all levels.

Collection of cybersecurity conference videos from GreHack 2018 covering various cutting-edge topics.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved