Resources for CloudNative security research
☆32Aug 31, 2021Updated 4 years ago
Alternatives and similar repositories for cloud-native-security
Users that are interested in cloud-native-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Matrisea is a web-based Android reversing platform that provides high-fidelity virtual devices with powerful integrated tools☆10Mar 1, 2023Updated 3 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- 通过内存特征检测frida☆10Nov 5, 2019Updated 6 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- some kernel exploit challenges and cve analysis☆26Nov 30, 2018Updated 7 years ago
- practice-toy-wasm-vm-go☆11Apr 20, 2022Updated 3 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Send and receive messages over Named Pipes asynchronously.☆39Sep 17, 2021Updated 4 years ago
- Protect your docker container from the public internet☆12Sep 5, 2017Updated 8 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- awesome resources about cloud native security 🐿☆326Nov 4, 2023Updated 2 years ago
- Static Web page hosting☆15Feb 14, 2015Updated 11 years ago
- A demo about how to build a real compiler with LLVM libraries, write for the book https://github.com/tuoxie007/play_with_llvm☆10Apr 11, 2020Updated 5 years ago
- ☆80Nov 17, 2019Updated 6 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- ☆91Jun 23, 2016Updated 9 years ago
- Encase Script to parse harddrive for MFT data☆16Jun 17, 2016Updated 9 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- Create Raspberry Pi 3G Hotspot and WLAN-Accesspoint☆16Sep 3, 2015Updated 10 years ago
- docker vulnerability analysis☆50Feb 13, 2016Updated 10 years ago
- ☆372Oct 30, 2025Updated 4 months ago
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Jun 16, 2020Updated 5 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- ☆11Jul 26, 2022Updated 3 years ago
- IDA SDK tech demo☆39May 25, 2020Updated 5 years ago
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- CIDR to IP List Tool☆14Mar 12, 2016Updated 10 years ago
- An efficient runtime for asynchronous applications in Rust.☆43Nov 8, 2022Updated 3 years ago
- 第二届阿里云安全算法挑战赛☆16May 11, 2018Updated 7 years ago
- alternative reality☆18Mar 1, 2017Updated 9 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- A C++ Yara Rule Runner☆13Apr 22, 2022Updated 3 years ago
- Vault Exploit Defense☆127Sep 7, 2024Updated last year
- A Compiler and Runtime System for Deterministic Multithreaded Execution☆11Jun 11, 2015Updated 10 years ago
- Container (Docker) escape exploits☆53Dec 15, 2021Updated 4 years ago
- 虚拟机带外内存监控☆14Mar 30, 2018Updated 7 years ago
- A small tool for quickly generating LLVM passes☆29Sep 22, 2025Updated 6 months ago
- Docker + CVE-2015-2925 = escaping from --volume☆11Jun 30, 2015Updated 10 years ago