insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.
☆50Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for insject
Users that are interested in insject are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆30May 12, 2025Updated last year
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Jul 20, 2022Updated 3 years ago
- ☆45May 12, 2025Updated last year
- Swift code to run a dylib on disk☆16May 9, 2022Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆28Nov 4, 2022Updated 3 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆110May 24, 2020Updated 5 years ago
- ☆20Feb 9, 2024Updated 2 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- ☆16Jul 17, 2024Updated last year
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆30Jan 13, 2026Updated 4 months ago
- Lightspin AWS IAM Vulnerability Scanner☆95Mar 28, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆24Apr 27, 2026Updated 3 weeks ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 6 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- A tool for interacting with live processes/containers☆22Sep 21, 2022Updated 3 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆32Jan 13, 2026Updated 4 months ago
- ☆39Sep 26, 2022Updated 3 years ago
- ☆42Nov 13, 2025Updated 6 months ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- ☆12Jun 22, 2022Updated 3 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated last year
- Execute .Net assemblies using Rundll32.exe☆116Mar 17, 2021Updated 5 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆13Dec 29, 2022Updated 3 years ago
- A replacement for "kubectl exec" that works over WebSocket connections.☆43Mar 30, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Linux Kernel N-day Exploit/Analysis.☆64Oct 21, 2024Updated last year
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated last year
- ☆109Oct 14, 2021Updated 4 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 9 years ago
- build distroless images with alpine tools☆130May 17, 2022Updated 4 years ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆35Apr 13, 2026Updated last month