lockfale / Malicious_Containers_Workshop
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆43Updated 7 months ago
Related projects ⓘ
Alternatives and complementary repositories for Malicious_Containers_Workshop
- Sniffing out well-known threat groups☆28Updated 2 months ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆29Updated 9 months ago
- Open Threat Hunting Framework☆102Updated last year
- ☆18Updated 2 years ago
- Repository that contains a set of purposefully erroneous Yara rules.☆48Updated 9 months ago
- ☆23Updated last year
- This repository contains a comprehensive testing designed for evaluating the performance and resilience of Endpoint Detection and Respons…☆46Updated 3 weeks ago
- Supporting materials for my "Intelligence-Led Adversarial Threat Modelling with VECTR" workshop☆56Updated 3 weeks ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆101Updated 2 years ago
- DEFCON 31 slide deck and video link☆58Updated 4 months ago
- A zero dependency and customizable Python library for scanning Windows and Linux process memory.☆62Updated 9 months ago
- SubCrawl is a modular framework for discovering open directories, identifying unique content through signatures and organizing the data w…☆49Updated 5 months ago
- Collection of Tools & Techniques for analyzing URLs☆30Updated last year
- A CALDERA plugin☆25Updated 3 months ago
- Providing Azure pipelines to create an infrastructure and run Atomic tests.☆50Updated last year
- Collection of Docker honeypot logs from 2021 - 2024☆35Updated last month
- This CALDERA Plugin converts Adversary Emulation Plans from the Center for Threat Informed Defense☆29Updated 8 months ago
- Repo containing various intel-based resources such as threat research, adversary emulation/simulation plan and so on☆81Updated 6 months ago
- A collection of CVEs weaponized by ransomware operators☆51Updated this week
- A repository to help CTI teams tackle the challenges around collection and research by providing guidance from experienced practitioners☆44Updated last week
- Actively hunt for attacker infrastructure by filtering Shodan results with URLScan data.☆60Updated 3 months ago
- Bash Script to extract GNU/Linux forensic artifacts for digital forensic analysis and incident response.☆43Updated last year
- ☆15Updated last year
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆56Updated last year
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 3 years ago
- ☆76Updated 5 months ago
- HASH (HTTP Agnostic Software Honeypot)☆128Updated 6 months ago
- labs_modern_malware_c2 Originally supporting Defcon workshop, will morph into Attack Defend for C2.☆18Updated 2 years ago
- Cloud, CDN, and marketing services leveraged by cybercriminals and APT groups☆57Updated 2 years ago