Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆50Apr 2, 2024Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
Sorting:
- meterpreter connetion☆24Nov 27, 2017Updated 8 years ago
- Advanced Reconnaissance Framework — Google Chrome extension☆29Mar 4, 2016Updated 9 years ago
- Simple reverse ICMP shell☆14Apr 30, 2024Updated last year
- Offensive Assembly code snippets.☆13Jul 12, 2023Updated 2 years ago
- A custom SentinelOne USB scanner.☆18Mar 26, 2022Updated 3 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- Looks up permissions within Active Directory on a target (OU or Computer) to determine access to LAPS attributes (ms-Mcs-AdmPwdExpiration…☆16May 31, 2023Updated 2 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- ☆15Aug 7, 2021Updated 4 years ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- A simple DOS attack tool☆14Sep 21, 2019Updated 6 years ago
- A swiss army knife for pentesting networks☆24Mar 16, 2023Updated 2 years ago
- A live video stream license plate detector based on OpenALPR☆22Oct 1, 2020Updated 5 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- Asynchronous MSF RPC API wrapper☆20Dec 8, 2022Updated 3 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- A VS Code/Cursor extension capable of performing realtime security monitoring from inside the IDE☆75Feb 13, 2026Updated 2 weeks ago
- OWASP EKS Goat is a deliberately vulnerable EKS cluster environment to explore AWS cloud-native security through hands-on attack and defe…☆41Feb 20, 2026Updated last week
- Remote Thread Detection with a Kernel Driver☆34Jan 14, 2025Updated last year
- pysnaffler☆110Jan 6, 2026Updated last month
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆33Nov 12, 2025Updated 3 months ago
- DEFCON 31 slide deck and video link☆67Jun 2, 2025Updated 9 months ago
- A tool to test penetration into personal systems (current version is beta)☆37Sep 10, 2022Updated 3 years ago
- Example Telegram bot☆10Oct 2, 2023Updated 2 years ago
- ☆10Aug 4, 2020Updated 5 years ago
- Gallery Hack Form Our Team☆11Aug 10, 2023Updated 2 years ago
- Crane POAM Automation Tool (C-PAT™)☆15Feb 24, 2026Updated last week
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- A basic exemple of the API-Hashing method used by Red Teamers but also by malwares developers in C++☆37Jan 10, 2024Updated 2 years ago
- Pentest tool for OSINT in social networks☆36Sep 10, 2015Updated 10 years ago
- Troyano espía, Keylogger para Windows, se replica en el sistema y se inicia automaticamente al iniciar sesión. Envía los datos mediante G…☆12May 9, 2020Updated 5 years ago
- Installation tools for CircleCI Server - Static☆10Jan 14, 2023Updated 3 years ago
- 🤘🤘🤘SMS BOMB FOR BANGLADESH(BD),INDIA,PAKISTAN,UK,MALAYSIA,ISREAL,PALEASTINE,🤘🤘🤘☆17Jun 5, 2021Updated 4 years ago
- Grouper Python Client Library☆10Apr 18, 2023Updated 2 years ago
- it is a trojan at least, half of it is 💀 See Readme☆10Feb 26, 2021Updated 5 years ago
- A CVRF CSAF Converter, taking care about OASIS specification.☆10Jun 4, 2025Updated 8 months ago