Pray3r / cloud-native-securityLinks
Resources for CloudNative security research
☆32Updated 4 years ago
Alternatives and similar repositories for cloud-native-security
Users that are interested in cloud-native-security are comparing it to the libraries listed below
Sorting:
- Deprecated: Please visit https://github.com/github/codeql instead.☆81Updated 3 years ago
- This repo stores all challenges and writeups of CTFs we have participated in☆35Updated 7 years ago
- The FTP fuzzer for Sulley and Peach.☆53Updated 12 years ago
- A tool for malicious behavior detection in IoT devices☆77Updated 7 years ago
- https://www.cdxy.me/?p=806☆32Updated 6 years ago
- Automated SonarQube☆70Updated 6 years ago
- Collection of AI and Security Papers☆27Updated 5 years ago
- gamebox admin scripts for DEF CON 22~23 CTF Finals☆16Updated 9 years ago
- General Open Architecture Security Questionnaire☆31Updated 2 years ago
- embedded-device-lab是一个利用qemu模拟真实世界中物联网漏洞的测试环境。由于物联网架构的特殊性,调试分析漏洞通常需要使用qemu模拟执行不同架构的可执行文件。而各种搭建环境,交叉编译是一件费事费力,令人忧伤的工作。 embedded-device-la…☆56Updated 8 years ago
- Explore Indicators of Compromise Automatically☆97Updated 5 years ago
- 之Crypto☆43Updated 9 years ago
- Web Input Vector Extractor Teaser☆133Updated 4 years ago
- Result files from various fuzzing runs☆16Updated 4 years ago
- ☆41Updated 7 years ago
- awesome security paper☆155Updated 10 years ago
- ☆46Updated 9 years ago
- 使用kprobe获取sys_execve参数☆12Updated 7 years ago
- ☆29Updated 5 years ago
- Machine Learning for Cyber Security☆27Updated 8 years ago
- Fuzzing Browsers☆314Updated 3 years ago
- ☆45Updated 5 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆56Updated 4 years ago
- CTF box with most tools installed☆89Updated 7 years ago
- BSidesSF CTF 2019 release☆72Updated 3 years ago
- Vulnerability Verification Environment based on Docker☆111Updated 6 years ago
- 基于docker虚拟化的恶意代码沙箱☆70Updated 7 years ago
- Automate repetitive tasks for fuzzing☆124Updated 4 years ago
- A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on…☆25Updated 9 years ago
- Baseline IoT security checklist. Consider security as early in development as possible and reap the rewards.☆30Updated 8 years ago