Pray3r / cloud-native-security
Resources for CloudNative security research
☆32Updated 3 years ago
Alternatives and similar repositories for cloud-native-security:
Users that are interested in cloud-native-security are comparing it to the libraries listed below
- ☆24Updated 5 years ago
- Automated SonarQube☆73Updated 5 years ago
- This tool was written as PoC to article https://waf.ninja/libinjection-fuzz-to-bypass/☆37Updated 7 years ago
- Collection of AI and Security Papers☆27Updated 4 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆163Updated 5 years ago
- Materials from Fuzzing Bay Area meetups☆57Updated 5 years ago
- https://www.cdxy.me/?p=806☆31Updated 5 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Updated 5 years ago
- sAoccec something about ossec☆17Updated 11 years ago
- The FTP fuzzer for Sulley and Peach.☆54Updated 11 years ago
- Project code and dependent component analysis tools.☆2Updated last year
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Updated 8 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 6 years ago
- Collate and collect binary related materials, including papers, tools, etc. Now,there are the following categories: 1、Fuzzing☆56Updated 5 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆53Updated 3 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 7 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Updated 6 years ago
- Deprecated: Please visit https://github.com/github/codeql instead.☆81Updated 2 years ago
- ☆44Updated 4 years ago
- Fragscapy is a command-line tool to fuzz network protocols by automating the modification of outgoing network packets. It can run multipl…☆73Updated 3 years ago
- 使用kprobe获取sys_execve参数☆12Updated 6 years ago
- ☆51Updated 6 years ago
- ☆37Updated last year
- Explore Indicators of Compromise Automatically☆94Updated 5 years ago
- 虚拟机带外内存监控☆14Updated 6 years ago
- Vulnerability Verification Environment based on Docker☆112Updated 5 years ago
- Result files from various fuzzing runs☆16Updated 3 years ago
- ☆40Updated 6 years ago
- The unofficial release of the tool we used in the EuroS&P 2017 paper: Open Doors for Bob and Mallory: Open Port Usage in Android Apps and…☆23Updated 7 years ago