Damn Vulnerable NodeJS Application
A step-by-step walkthrough of CloudGoat 2.0 scenarios.
Defcon24 Workshop Contents : Ninja Level Infrastructure Monitoring
DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source
Docker container for Markdown based Raneto Knowledgebase
Data Science Command Line Toolbox in a docker container
OWASP Threat Dragon with Gitlab Integration