lockfale / Malicious_Containers_WorkshopLinks
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆49Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
Sorting:
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆52Updated this week
- ReconPal: Leveraging NLP for Infosec☆56Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 2 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated last year
- ☆94Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- Examine Chrome extensions for security issues☆87Updated last week
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆60Updated 4 years ago
- Hashes of infamous malware☆26Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆68Updated 6 months ago
- Curated list of awesome, open source data exfiltration tools☆63Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated last year
- A repo to support the book☆110Updated 4 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- ☆25Updated 5 months ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- ☆60Updated 2 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- Cloudformation Template to Launch the SOC from Kali Purple☆53Updated last year
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆55Updated 3 years ago