lockfale / Malicious_Containers_WorkshopLinks
Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers
☆48Updated last year
Alternatives and similar repositories for Malicious_Containers_Workshop
Users that are interested in Malicious_Containers_Workshop are comparing it to the libraries listed below
Sorting:
- Run Capture the Flags and Security Trainings with OWASP WrongSecrets☆51Updated this week
- Robo-Red-Team: Training platform for blue team cybersecurity professionals☆51Updated 4 years ago
- Repository of tools and resources for analyzing Docker containers☆67Updated last year
- BSidesRoc 2022 Linux Malware/Forensics Course☆77Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆59Updated 4 years ago
- A list of awesome penetration testing tools and resources.☆80Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- A repo to support the book☆108Updated 4 years ago
- Publicly availalbe vulnarble by desgin vm/machines☆31Updated 3 years ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆65Updated 3 months ago
- Black Friday deals (Cyber/OSINT/Infosec)☆29Updated 4 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Updated 2 years ago
- Red Team Tools used for Pros Versus Joes CTF Games. Here for Blue Teams to understand the pwnage.☆29Updated last year
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆71Updated last year
- Reads and prints information from the website MalAPI.io☆39Updated 3 years ago
- Collection of Tools & Techniques for analyzing URLs☆32Updated last year
- ReconPal: Leveraging NLP for Infosec☆57Updated 3 years ago
- ☆94Updated 2 years ago
- InfoSec OpenAI Examples☆19Updated last year
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆40Updated 3 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆114Updated 3 years ago
- Files for my Python3 Create Your Own Tool Series☆25Updated 3 years ago
- WordPress version identification and vulnerability finder.☆31Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Canary Hunter aims to be a quick PowerShell script to check for Common Canaries in various formats generated for free on canarytokens.org☆121Updated 2 years ago
- The Atomic Playbook contains TTPs from the MITRE ATT&CK framework mapped to the tests in the Atomic Red Team. It serves as a single resou…☆33Updated 2 months ago
- New Framework Red Team Operations☆18Updated 4 years ago