lockfale / Malicious_Containers_WorkshopLinks
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆50Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
Sorting:
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆53Updated last week
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 5 years ago
- BSidesRoc 2022 Linux Malware/Forensics Course☆76Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆58Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- ☆94Updated 3 years ago
- Curated list of awesome, open source data exfiltration tools☆63Updated 4 years ago
- InfoSec OpenAI Examples☆19Updated 2 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆70Updated 7 months ago
- ☆60Updated 2 years ago
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆43Updated 3 years ago
- Repository of tools and resources for analyzing Docker containers☆71Updated 2 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆115Updated 4 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 5 years ago
- A basic Python program to check Cybersecurity & Infrastructure Security Agency (CISA) Known Exploited Vulnerabilities (KEV) Catalog☆23Updated 2 years ago
- ☆34Updated 2 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- This repository contains the code and PCAPS used for the SANS webinar, "Hacking Proprietary Protocols" given on February 23, 2021.☆34Updated 3 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- LLM Testing Findings Templates☆75Updated last year
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆62Updated 4 years ago
- Shortemall is a Python-based tool that automates the process of scanning hidden content of Short URLs.☆90Updated last year
- ☆49Updated 3 months ago