RedHatProductSecurity / vulnerability-detection-scripts
Vulnerability detection scripts for Red Hat Enterprise Linux
☆19Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for vulnerability-detection-scripts
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Updated 4 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 6 months ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- Capsule8: open-source cloud-native behavioral security monitoring☆30Updated 6 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆53Updated 2 years ago
- 🔓 Yet Another S3 Bucket Leak☆26Updated 6 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Updated 4 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- Python framework for manipulating bulk WHOIS data from RIRs☆19Updated 2 years ago
- Presentations from the CX Security Labs team☆32Updated last month
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago
- Aqua Enterprise scanner as a plug-in vulnerability scanner in the Harbor registry☆36Updated last month
- Ansible role for security standards compliance☆13Updated 5 years ago
- Advanced threat detection solution for Linux.☆36Updated 3 years ago
- A software tool kit to help identify quickly what's inside your binary files.☆13Updated last month
- VulsRepo is visualized based on the json report output in vuls.☆33Updated 2 years ago
- Tracing security events in container with BPF☆15Updated 11 months ago
- Pattern recognition for hosts, services, and content☆13Updated 2 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆53Updated 4 years ago
- Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.☆20Updated 5 months ago
- Simplified go-cat agent for caldera☆10Updated 10 months ago
- A repository for OSSEC rules and decoders☆51Updated last year
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated last month