lockfale / Malicious_Containers_Workshop
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆48Updated 10 months ago
Alternatives and similar repositories for Malicious_Containers_Workshop:
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
- ☆15Updated last year
- Repository of tools and resources for analyzing Docker containers☆62Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- Open Threat Hunting Framework☆109Updated last year
- Random things for my own reference☆22Updated 2 years ago
- ReconPal: Leveraging NLP for Infosec☆55Updated 2 years ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- ☆46Updated 3 weeks ago
- A CALDERA plugin☆25Updated 6 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- PlasmaPup is designed to help central and departmental IT personnel understand their exposures in Active Directory by showing which accou…☆27Updated 10 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Examine Chrome extensions for security issues☆75Updated last week
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 6 months ago
- BLS-Bible is a knowledge-base application that houses a collection of guides and write-ups that BLS uses for our various operations.☆27Updated last year
- ☆18Updated 2 years ago
- Threat Hunter's Knowledge Base☆22Updated 3 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆49Updated last year
- My Jupyter Notebooks☆36Updated 10 months ago
- Docker Crash Course: How to containerize your favorite security tools☆27Updated last year
- A collection of Script for Red Team & Incidence Response☆11Updated 2 years ago
- God Mode Detection Rules☆134Updated 6 months ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- Slides of my public talks☆54Updated last year
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆50Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆26Updated 7 months ago