Simulator Logo

Simulator

0
Free
Visit Website

A distributed systems and infrastructure simulator for attacking and debugging Kubernetes. The simulator creates a Kubernetes cluster in your AWS account, runs scenarios to misconfigure it and/or leave it vulnerable, and trains you to mitigate these vulnerabilities. It supports various methods of authentication for provisioning the AWS infrastructure such as Environment Variables and Shared Credentials file.

FEATURES

ALTERNATIVES

Collection of URLs for vulnerable web applications and systems for cybersecurity practice.

Exploiting WordPress With Metasploit, containing 45 modules for exploits and auxiliaries.

A comprehensive .NET post-exploitation library designed for advanced security testing.

A tool that checks expired domains for categorization/reputation and Archive.org history to determine good candidates for phishing and C2 domain names.

A framework for testing and exploiting race conditions in software

A Linux-based environment for penetration testing and vulnerability exploitation

A free, safe, and legal training ground for ethical hackers to test and expand their skills

A CRLF and open redirect fuzzer

PINNED