insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.
☆50Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for insject
Users that are interested in insject are comparing it to the libraries listed below
Sorting:
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Jul 20, 2022Updated 3 years ago
- ☆46May 12, 2025Updated 10 months ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆110May 24, 2020Updated 5 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- ☆16Jul 17, 2024Updated last year
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated 2 months ago
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Dynamically resolve API function addresses at runtime in a secure manner.☆73Nov 11, 2025Updated 4 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆31Jan 13, 2026Updated 2 months ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- ☆39Sep 26, 2022Updated 3 years ago
- ☆42Nov 13, 2025Updated 4 months ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- K8s API Honeypot with Active Defense Capabilities☆44Jan 7, 2024Updated 2 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- Execute .Net assemblies using Rundll32.exe☆115Mar 17, 2021Updated 5 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆13Dec 29, 2022Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- A replacement for "kubectl exec" that works over WebSocket connections.☆43Mar 30, 2024Updated last year
- Linux Kernel N-day Exploit/Analysis.☆65Oct 21, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- ☆108Oct 14, 2021Updated 4 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- build distroless images with alpine tools☆130May 17, 2022Updated 3 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Golang Shlyuz Implant Implementation☆13May 23, 2025Updated 9 months ago