Pray3r / cloud-native-security
Resources for CloudNative security research
☆32Updated 3 years ago
Alternatives and similar repositories for cloud-native-security:
Users that are interested in cloud-native-security are comparing it to the libraries listed below
- Materials from Fuzzing Bay Area meetups☆56Updated 5 years ago
- Collection of AI and Security Papers☆27Updated 4 years ago
- ☆24Updated 4 years ago
- Automated SonarQube☆73Updated 5 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Updated 5 years ago
- ☆44Updated 4 years ago
- https://www.cdxy.me/?p=806☆31Updated 5 years ago
- A Solution For Cross-Platform Obfuscated Commands Detection presented on CIS2019 China. 动静态Bash/CMD/PowerShell命令混淆检测框架 - CIS 2019大会☆164Updated 5 years ago
- Peach Fuzzer 3.x☆21Updated 8 years ago
- This tool was written as PoC to article https://waf.ninja/libinjection-fuzz-to-bypass/☆37Updated 7 years ago
- ☆38Updated last year
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆43Updated last year
- sAoccec something about ossec☆17Updated 11 years ago
- ☆46Updated 8 years ago
- Oops, It's funny to detect a webshell. Temporarily not maintained☆18Updated 7 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 6 years ago
- Project code and dependent component analysis tools.☆2Updated last year
- Result files from various fuzzing runs☆16Updated 3 years ago
- ☆37Updated 9 years ago
- 一个HIDS agent端的demo☆17Updated 4 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 7 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Explore Indicators of Compromise Automatically☆94Updated 4 years ago
- ☆29Updated 4 years ago
- The FTP fuzzer for Sulley and Peach.☆54Updated 11 years ago
- ☆70Updated 7 years ago
- BSidesSF CTF 2019 release☆72Updated 2 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 7 years ago
- Custom Fortify SCA rules to detect common JSSE certification validation flaws☆11Updated 9 years ago
- Snort rules☆35Updated 6 years ago