lockfale / Malicious_Containers_WorkshopLinks
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆50Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
Sorting:
- Repository of tools and resources for analyzing Docker containers☆72Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆59Updated 3 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆75Updated 3 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- Curated list of awesome, open source data exfiltration tools☆62Updated 4 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆54Updated this week
- A repo to support the book☆113Updated 4 years ago
- Network security visualization tool, showcasing live traffic between internal and external hosts in a real-time visualization.☆27Updated 2 years ago
- Examine Chrome extensions for security issues☆93Updated 2 months ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆73Updated last year
- ☆41Updated last year
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆78Updated 2 years ago
- Collection of Tools & Techniques for analyzing URLs☆33Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 8 months ago
- ☆94Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆117Updated 4 years ago
- A MITRE ATT&CK Lookup Tool☆46Updated last year
- Open Threat Hunting Framework☆123Updated 2 years ago
- ☆60Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆56Updated 4 years ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆124Updated last month
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆27Updated 10 months ago
- Small enough to carry on your back (Backpack) 🎒💻☆32Updated 2 years ago
- Knowledge base on cybercriminal concealment techniques☆95Updated this week
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago