docker-training / security-workshopLinks
Repository for Security Workshop content
☆20Updated 8 years ago
Alternatives and similar repositories for security-workshop
Users that are interested in security-workshop are comparing it to the libraries listed below
Sorting:
- Troje is a honeypot built around lxc containers. It will run each connection with the service within a seperate lxc container.☆45Updated 11 years ago
- Data Exfiltration and Command Execution via AAAA Records☆68Updated 9 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 9 years ago
- VPS infrastructure found in HT dumps☆26Updated 10 years ago
- Find ssh keys with no passwords and try them against a bunch of hosts.☆46Updated 10 years ago
- This repository is a curated list of pro bono incident response entities.☆21Updated 2 years ago
- YAPDNS☆39Updated 10 years ago
- docker based telnet honeypot☆80Updated 7 years ago
- Honeybrid is a network application built to 1) administrate network of honeypots, and 2) transparently redirect live network sessions (TC…☆31Updated 6 years ago
- Docker configs and build scripts.☆23Updated 11 years ago
- My Quick Note of BlackHat 2015 Arsenal☆26Updated 10 years ago
- ☆12Updated 8 years ago
- Flash crossdomain policy security checker☆26Updated 10 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Exfiltrate files via DNS☆95Updated 12 years ago
- Wax is a mediocre fuzzer I'm prototyping to test some ideas and get rid of others.☆18Updated 7 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Updated 9 years ago
- Data exfiltration using covert channels in the TCP/IP protocol with some basic steganography.☆13Updated 8 years ago
- Auditing & Hardening script for Kubernetes☆45Updated 7 years ago
- An active domain name query tool to help keep track of domain name movements...☆15Updated 4 years ago
- CVE Builder script that generates STIX formatted Exploit Target objects☆18Updated 9 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Updated 10 years ago
- My personal experience in Threat Hunting and knowledge gained so far.☆19Updated 8 years ago
- IDS Utility Belt For Automating/Testing Various Things☆30Updated 5 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- Things to know when DFIR occurs near a vault deployment.☆44Updated 7 years ago
- Metadata Inspection Database Alerting System☆42Updated 12 years ago
- Grab a Twitter user timeline for further processing (storing to Elasticsearch, highligthing, etc)☆41Updated 10 years ago
- first commit☆20Updated 3 months ago
- Cli interface to threatcrowd.org☆20Updated 8 years ago