Some of my rough notes for Docker threat detection
☆49Aug 26, 2023Updated 2 years ago
Alternatives and similar repositories for DockerDetectionNotes
Users that are interested in DockerDetectionNotes are comparing it to the libraries listed below
Sorting:
- ☆30Jan 12, 2023Updated 3 years ago
- ☆11Aug 31, 2023Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Oct 14, 2023Updated 2 years ago
- OmniCrawl is a web measurement tool that allows for recording of web requests and JavaScript browser API accesses on multiple platforms.☆27Mar 20, 2024Updated last year
- Windows Exploit Protection Settings (Ultimate) GUI☆75Jan 3, 2026Updated last month
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Aug 31, 2023Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆63Apr 13, 2024Updated last year
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- Queries for Carbon Black Response☆11Feb 11, 2020Updated 6 years ago
- Python based tool to extract forensic info from EventTranscript.db (Windows Diagnostic Data)☆68Sep 13, 2023Updated 2 years ago
- ICMPWatch: ICMP Packet Sniffer☆57Oct 15, 2024Updated last year
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- A collection of pen-testing/hacking scripts. Various uses.☆13Oct 24, 2020Updated 5 years ago
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Exploits for CVE-2023-27327 and CVE-2023-27328☆14May 9, 2023Updated 2 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- Yet another fseventsd parser for macOS forensics☆12Jul 20, 2024Updated last year
- A repository with UEFI research stuff☆16Jun 23, 2023Updated 2 years ago
- Work with the AWS IP address ranges in native Python.☆13Sep 21, 2023Updated 2 years ago
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- ☆90Aug 5, 2023Updated 2 years ago
- ☆12Jan 11, 2020Updated 6 years ago
- Public exploits☆16May 28, 2018Updated 7 years ago
- This repository contains a graphical representation (Mind maps) of specific topics, so one can utilize it as a handbook for that specific…☆17Feb 10, 2022Updated 4 years ago
- ☆41Oct 20, 2023Updated 2 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- A small executable to trick a user to authenticate using code matching MFA☆68Oct 6, 2023Updated 2 years ago
- ☆19Aug 4, 2021Updated 4 years ago
- A repo containing some tooling build to assist with reverse engineering malware samples☆15Jul 22, 2023Updated 2 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 5 years ago
- VED-eBPF: Kernel Exploit and Rootkit Detection using eBPF☆168Sep 7, 2024Updated last year
- One Click Tool to Scan All the Enabled Protection of current Windows NT Kernel☆43Oct 2, 2023Updated 2 years ago
- A Repository to Track Anti-Forensic Techniques☆118Mar 8, 2023Updated 2 years ago
- PowerShell Script Analyzer☆69Oct 26, 2023Updated 2 years ago
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Aug 9, 2023Updated 2 years ago