A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)
☆25Jul 3, 2018Updated 7 years ago
Alternatives and similar repositories for containers-security-project
Users that are interested in containers-security-project are comparing it to the libraries listed below
Sorting:
- POC CVE-2019-0708 with python script!☆14Jun 24, 2019Updated 6 years ago
- ☆10Jul 5, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Conference talk slides and code☆11Aug 6, 2020Updated 5 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- CVE-2019-0708 Exploit Tool☆18Jul 18, 2019Updated 6 years ago
- ☆12Aug 20, 2021Updated 4 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- ☆11Feb 16, 2025Updated last year
- ☆20Oct 19, 2018Updated 7 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Dynamic filtering of kubernetes logs according to pod labels☆23Sep 9, 2019Updated 6 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- ☆58Jun 28, 2020Updated 5 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- My OSCP report template in LaTex☆25Jan 31, 2020Updated 6 years ago
- Bruteforce commandline buffer overflows and automated exploit generation, linux, aggressive arguments☆34Apr 10, 2022Updated 3 years ago
- 个人网站☆14Feb 18, 2026Updated last week
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Kurukshetra - A framework for teaching secure coding by means of interactive problem solving.☆140Sep 23, 2024Updated last year
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31May 10, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38May 16, 2017Updated 8 years ago
- A security monitoring solution for Kubernetes☆132Oct 18, 2023Updated 2 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- LLM Playground☆13Nov 4, 2024Updated last year
- Open Mesh OM5P-AC v2 Unlocker (U-Boot 1.1.4 based)☆36Feb 13, 2017Updated 9 years ago
- Wraps sudo; transparently steals user's credentials. For those annoying times when you get a shell/file write on a sudoers account and ne…☆35Nov 15, 2024Updated last year
- ☆14Jun 5, 2020Updated 5 years ago
- AWS CloudWatch client library to send metrics conveniently and efficiently☆12Feb 10, 2023Updated 3 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- Reverse IP Lookup Tool that allows you to use an IP address to identify all websites hosted on a server.☆10Jun 29, 2016Updated 9 years ago
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago
- ☆10Jun 28, 2017Updated 8 years ago