Pray3r / cloud-native-securityLinks
Resources for CloudNative security research
☆32Updated 4 years ago
Alternatives and similar repositories for cloud-native-security
Users that are interested in cloud-native-security are comparing it to the libraries listed below
Sorting:
- ☆40Updated 7 years ago
- This repo stores all challenges and writeups of CTFs we have participated in☆35Updated 6 years ago
- A tool for malicious behavior detection in IoT devices☆76Updated 6 years ago
- Deprecated: Please visit https://github.com/github/codeql instead.☆81Updated 3 years ago
- awesome security paper☆154Updated 9 years ago
- Off-Path TCP Exploit: How Wireless Routers Can Jeopardize Your Secret☆108Updated 7 years ago
- 基于docker虚拟化的恶意代码沙箱☆71Updated 7 years ago
- Collection of AI and Security Papers☆28Updated 5 years ago
- Automated SonarQube☆70Updated 6 years ago
- machine learning for security☆77Updated 5 years ago
- https://www.cdxy.me/?p=806☆32Updated 6 years ago
- The FTP fuzzer for Sulley and Peach.☆53Updated 11 years ago
- ☆39Updated last year
- Result files from various fuzzing runs☆16Updated 3 years ago
- BSidesSF CTF 2019 release☆71Updated 2 years ago
- Proof-of-concept program that is able to to hijack/hook/proxy Python module(s) thanks to $PYTHONPATH variable☆152Updated 8 years ago
- 之Crypto☆43Updated 8 years ago
- sAoccec something about ossec☆17Updated 12 years ago
- CTF writeup for learning☆22Updated 4 years ago
- Vulnerability Verification Environment based on Docker☆111Updated 6 years ago
- Explore Indicators of Compromise Automatically☆96Updated 5 years ago
- ☆19Updated 9 years ago
- Machine Learning for Cyber Security☆27Updated 8 years ago
- ☆46Updated 9 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Updated 3 years ago
- Burp Suite plugin which implement PyJFuzz for fuzzing web application.☆56Updated 8 years ago
- CTF box with most tools installed☆89Updated 7 years ago
- A collection of Browser DOM Vulnerabilities with PoCs☆40Updated 6 years ago
- Challenges I created for 35c3☆48Updated 6 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago