lockfale / Malicious_Containers_WorkshopLinks
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆47Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
Sorting:
- Open Threat Hunting Framework☆117Updated 2 years ago
- A repo to support the book☆108Updated 3 years ago
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆48Updated last week
- Convert Nmap output for integration with other Project Discovery tools☆15Updated 2 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆54Updated 3 years ago
- InfoSec OpenAI Examples☆19Updated last year
- An LLM and OCR based Indicator of Compromise Extraction Tool☆33Updated 6 months ago
- A curated checklist of tasks to be done during engagements☆32Updated 9 months ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 3 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆27Updated 10 months ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 3 years ago
- Reads and prints information from the website MalAPI.io☆38Updated 3 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆52Updated 4 months ago
- ☆94Updated 2 years ago
- ☆57Updated 2 years ago
- ☆39Updated 6 months ago
- ☆47Updated 2 months ago
- Examine Chrome extensions for security issues☆85Updated 3 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆19Updated 2 years ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 2 years ago
- ☆35Updated 3 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆28Updated 4 years ago
- Repository of tools and resources for analyzing Docker containers☆66Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆31Updated 2 years ago
- A public repository of MITRE ATT&ACK TTP mappings by BushidoUK for OSINT reports that lack a section breaking down the TTPs.☆25Updated 3 months ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- All kinds of tiny shells☆58Updated 2 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago