lockfale / Malicious_Containers_Workshop
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆43Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Malicious_Containers_Workshop
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 3 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆32Updated 10 months ago
- ☆18Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated 11 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆57Updated 3 years ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated last week
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆25Updated last year
- A CALDERA plugin☆25Updated 3 months ago
- ☆40Updated 3 months ago
- DEFCON 31 slide deck and video link☆57Updated 4 months ago
- Offensive Research Guide to Help Defense Improve Detection☆29Updated last year
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆32Updated 2 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆102Updated 2 years ago
- Repository of tools and resources for analyzing Docker containers☆59Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆25Updated 4 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆62Updated last year
- Slides for my conference talks☆43Updated last year
- ☆91Updated 2 years ago
- Send High & New Incidents to The Hive incident management Platform☆17Updated 3 years ago
- ☆24Updated last year
- ☆22Updated 4 years ago
- ☆15Updated last year
- ☆41Updated 2 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated last year
- ☆10Updated 3 months ago
- ☆28Updated 4 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago