lockfale / Malicious_Containers_WorkshopLinks
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆50Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
Sorting:
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- Repository of tools and resources for analyzing Docker containers☆72Updated 2 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 8 months ago
- ☆41Updated last year
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- An LLM and OCR based Indicator of Compromise Extraction Tool☆38Updated last year
- InfoSec OpenAI Examples☆19Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- ☆60Updated 2 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆61Updated 2 months ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆124Updated 3 years ago
- Knowledge base on cybercriminal concealment techniques☆95Updated this week
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- SANS Slingshot Linux Distribution☆56Updated 5 years ago
- A CALDERA plugin☆27Updated last week
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- ☆25Updated 2 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- ☆25Updated 7 months ago