Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆50Apr 2, 2024Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆40Jun 11, 2025Updated 9 months ago
- Damn Vulnerable CICS Application☆31Mar 2, 2024Updated 2 years ago
- using ML models for red teaming☆43Aug 9, 2023Updated 2 years ago
- ☆17Nov 15, 2022Updated 3 years ago
- C# AV bypass jank☆35Feb 9, 2021Updated 5 years ago
- ☆23May 22, 2018Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14May 29, 2018Updated 7 years ago
- A Simple Keylogger☆17Oct 1, 2018Updated 7 years ago
- Juju charms for Contrail services.☆13Mar 12, 2020Updated 6 years ago
- Asynchronous MSF RPC API wrapper☆21Dec 8, 2022Updated 3 years ago
- A simple DOS attack tool☆14Sep 21, 2019Updated 6 years ago
- Work files for my blog post "Code Caving in a PE file.☆16Dec 18, 2016Updated 9 years ago
- Secure Terminal CTF Challenge for DC31 Red Team Village☆19Aug 22, 2023Updated 2 years ago
- A Large Action Model designed to operate on MacOS or Windows which interacts with common C2 interfaces such as Cobalt Strike, Havoc, or B…☆26Feb 29, 2024Updated 2 years ago
- Kernel heap pointer disclosure in IOGraphicsFamily.☆13Aug 19, 2017Updated 8 years ago
- Hooked create process injection for meterpreter☆23Jun 16, 2021Updated 4 years ago
- Remote Thread Detection with a Kernel Driver☆34Jan 14, 2025Updated last year
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- ARP spoof then session jack within your browser☆28Feb 10, 2014Updated 12 years ago
- LobotoMl is a set of scripts and tools to assess production deployments of ML services☆10May 16, 2022Updated 3 years ago
- Use This tool at your own risk!☆12May 2, 2023Updated 2 years ago
- A tools for JavaScript Recon☆24Jul 25, 2020Updated 5 years ago
- source code for the offsecml framework☆45Jun 6, 2024Updated last year
- Malware analysis and Reverse Engineering Workshops from Invoke RE☆15Jun 30, 2024Updated last year
- A minimalistic automation framework designed to create user input forms from various types of APIs and templates.☆18Oct 1, 2018Updated 7 years ago
- DFF (Digital Forensics Framework)☆11Jan 6, 2021Updated 5 years ago
- DEFCON 31 slide deck and video link☆68Jun 2, 2025Updated 9 months ago
- all random stuff that dont warrant a seperate repo☆12Sep 2, 2022Updated 3 years ago
- ☆14Dec 3, 2020Updated 5 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- 802.11 radiotap and MPDU parser☆14Nov 23, 2017Updated 8 years ago
- Geppetto - Virtual machine and infrastructure orchestration☆14Feb 13, 2025Updated last year
- A serverless C2 framework☆14Feb 3, 2023Updated 3 years ago
- A live video stream license plate detector based on OpenALPR☆22Oct 1, 2020Updated 5 years ago
- Apstra Terraform Provider☆23Updated this week
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- angr's exploration technique to perform taint analysis☆63Mar 26, 2020Updated 5 years ago
- Gmail-Brute Force Tool ;)☆52Feb 7, 2024Updated 2 years ago
- ⚡ Starter Kit to build static websites fast with Middleman and Bootstrap☆11Oct 18, 2024Updated last year