A curated list of Docker resources
☆28Nov 13, 2015Updated 10 years ago
Alternatives and similar repositories for awesome-docker
Users that are interested in awesome-docker are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of awesome malware analysis tools and resources☆85Feb 27, 2016Updated 10 years ago
- A curated list of awesome lists☆44Nov 18, 2015Updated 10 years ago
- This repository is created to add value to existing Network Security Monitoring solutions.☆17Sep 30, 2016Updated 9 years ago
- Audit Powershell and search from known keywords in history #Blueteam☆25Apr 22, 2020Updated 6 years ago
- Indices for courses in SANS' Network Security Operations curriculum☆17Feb 5, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- ☆11Oct 6, 2022Updated 3 years ago
- A collection of open source threat detection rules created by Cyber Castle's team.☆14Jun 2, 2022Updated 3 years ago
- Athenz is a role-based authorization (RBAC) system for provisioning and configuration (centralized authorization) use cases as well as se…☆13Oct 29, 2019Updated 6 years ago
- ☆26May 12, 2026Updated last week
- A simple guideline for MacOs Security.☆13Jun 15, 2022Updated 3 years ago
- Collection of reusable references☆14May 3, 2026Updated 2 weeks ago
- ☆27Updated this week
- Common Continuous Integration Team Scenarios: Text Version☆11Aug 9, 2020Updated 5 years ago
- Microcorruption CTF☆12Jan 17, 2016Updated 10 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆28Apr 10, 2025Updated last year
- ☆26Nov 27, 2025Updated 5 months ago
- ☆26Updated this week
- ☆25Updated this week
- Repository for my ATT&CK analysis research.☆70May 16, 2019Updated 7 years ago
- String extraction and classification tool for binary files, designed to extract only the strings that can be considered relevant (i.e. no…☆11Aug 9, 2020Updated 5 years ago
- Linux Device Drivers 3 examples updated to work in recent kernels☆25May 6, 2012Updated 14 years ago
- Demisto Content Developer Docs☆45May 11, 2026Updated last week
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19May 26, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆26Jan 16, 2025Updated last year
- Various short scripts and tools used for Digital Forensics☆14Apr 13, 2025Updated last year
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- pCraft is a PCAP Crafter, which creates a PCAP from an AMI scenario.☆92Apr 11, 2024Updated 2 years ago
- The unofficial XSOAR CLI☆16Feb 2, 2023Updated 3 years ago
- ☆26Updated this week
- A quick bash script that I created in order to speed up the creation of usable kali boxes.☆12Oct 29, 2021Updated 4 years ago
- ☆27May 2, 2025Updated last year
- Demo showing how to build a good software supply chain from operations -> Middleware -> Develoeprs/Application Owners☆16Oct 28, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- ☆17Sep 4, 2014Updated 11 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- This is a general electron sample app to show authentication in electron via an external browser using OIDC☆27Oct 16, 2024Updated last year
- Simple DLP monitor for AWS S3 is a tool built on top of CloudWatch events and Lambda functions to alert you when data is transferred to S…☆18Mar 4, 2020Updated 6 years ago
- PowerShell tool to triage systems☆12May 17, 2023Updated 3 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago