Build custom Docker seccomp profiles for containers by finding syscalls it uses.
☆91Oct 19, 2025Updated 4 months ago
Alternatives and similar repositories for syscall2seccomp
Users that are interested in syscall2seccomp are comparing it to the libraries listed below
Sorting:
- Docker Secure Computing Profile Generator☆49Oct 22, 2021Updated 4 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- Breaking secure checksums in the scudo heap allocator☆14Apr 9, 2020Updated 5 years ago
- Sysdig agent Operator configure Sysdig platform in your Kubernetes cluster☆15Nov 2, 2023Updated 2 years ago
- Sample Terraform templates ready for env0 integration☆28Updated this week
- Custom & better AppArmor profile generator for Docker containers.☆1,225Sep 17, 2020Updated 5 years ago
- DEF CON 26 WorkShop - Fuzzing FTW☆20Aug 9, 2018Updated 7 years ago
- 🎯 Vulnerability Pryer - Prying context into your vulnerability data☆21Updated this week
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Jun 16, 2020Updated 5 years ago
- Trace ScriptBlock execution for powershell v2☆40Jan 14, 2020Updated 6 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- ☆10May 12, 2022Updated 3 years ago
- This repository provides a Terraform implementation that deploys an Amazon EKS cluster in a private VPC and deploys Windows and Linux wor…☆10Feb 23, 2022Updated 4 years ago
- Reverse Engineering tool for Ethereum EVM☆20Jun 30, 2016Updated 9 years ago
- Some slides from some presentations I have given☆25Jan 2, 2016Updated 10 years ago
- 支持解压Zip, 7z, RAR, Lzh, ZIPX, TAR, GZIP, BZIP, TGZ, TBZ, ISO, DEB, CAB, JAR, RPM, CBS等多种文件。☆12Jun 17, 2022Updated 3 years ago
- ☆13Jul 25, 2022Updated 3 years ago
- Fournir des ressources actionables de sécurité pour les services biomédicaux.☆11Mar 15, 2020Updated 5 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- A simple Kubernetes configuration modifier.☆48Dec 5, 2019Updated 6 years ago
- agent for handling seccomp descriptors for container runtimes☆47Feb 1, 2024Updated 2 years ago
- Demo application using GitOps best practices with Flux☆13Nov 29, 2021Updated 4 years ago
- Debug JSSE Provider☆14Dec 4, 2024Updated last year
- Berth use Docker containers to build packages for you, based on a YAML configuration file.☆11May 5, 2017Updated 8 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- ☆29Jan 31, 2025Updated last year
- Frida FDE bruteforce Samsung S7 Edge☆50Nov 4, 2019Updated 6 years ago
- Tools for building TIL for IDA SDK & exporting them to python wrapper☆21Jun 26, 2023Updated 2 years ago
- Multithreaded drupalgeddon2 scanner☆12Apr 21, 2018Updated 7 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- ☆15Oct 31, 2022Updated 3 years ago
- A Kubernetes ValidatingWebhookConfiguration and serverless backend: Deny Pods with container images that don't meet your compliance requi…☆12Dec 5, 2025Updated 2 months ago
- A Zygisk hooking module☆13Jan 10, 2023Updated 3 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- Track public endpoints and connections across AWS accounts using VPC Flow Logs☆12Jun 14, 2016Updated 9 years ago
- Terraform module to create Amazon EKS self-managed node groups on AWS☆12Jun 24, 2021Updated 4 years ago
- Cloud threat detection visualization from excalidraw☆12Apr 25, 2022Updated 3 years ago
- x86 Microkernel☆15Apr 1, 2020Updated 5 years ago
- Tool for generating Python AWS Lambda zip files☆10Jul 8, 2019Updated 6 years ago