insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.
☆50Jan 6, 2022Updated 4 years ago
Alternatives and similar repositories for insject
Users that are interested in insject are comparing it to the libraries listed below
Sorting:
- ☆16Jul 17, 2024Updated last year
- ☆29May 12, 2025Updated 9 months ago
- Custom Cobalt Strike stagers using different methods of thread execution and memory allocation☆111May 24, 2020Updated 5 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Swift code to run a dylib on disk☆16May 9, 2022Updated 3 years ago
- PoC exploits associated with the blog at https://grsecurity.net/exploiting_and_defending_against_same_type_object_reuse☆30Nov 4, 2022Updated 3 years ago
- Electron-Probe leverages the Node variant of the Chrome Debugging Protocol to execute JavaScript payloads inside of target Electron appli…☆31Jan 13, 2026Updated last month
- Tricard - Malware Sandbox Fingerprinting☆23Dec 11, 2023Updated 2 years ago
- ☆20Jun 13, 2022Updated 3 years ago
- Dynamically resolve API function addresses at runtime in a secure manner.☆72Nov 11, 2025Updated 3 months ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.☆56Jan 18, 2022Updated 4 years ago
- Proof-of-concept code for research into GitHub Actions Cache poisoning.☆21Mar 9, 2025Updated 11 months ago
- Red Team Assessment Platform - reporting, visualizations, and analytics for cybersecurity red teams☆34Jan 27, 2026Updated last month
- Lightspin AWS IAM Vulnerability Scanner☆94Mar 28, 2021Updated 4 years ago
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 10 months ago
- ☆39Sep 26, 2022Updated 3 years ago
- post exploitation user monitoring tool☆20Jul 3, 2018Updated 7 years ago
- Linux Process Discovery. C Library, Go bindings, Runtime.☆223Jul 20, 2022Updated 3 years ago
- Establishes mutually trusted TLS connections based on a pre-shared connection key.☆51Mar 21, 2024Updated last year
- Build a CVE library with aggregated CISA, EPSS and CVSS data☆29Sep 27, 2023Updated 2 years ago
- Cobalt Strike notifications via NTFY.☆15Sep 24, 2024Updated last year
- ☆108Oct 14, 2021Updated 4 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Lab Mouse Security research pertaining to RISC-V☆11May 13, 2017Updated 8 years ago
- CVE-2025-64155: Fortinet FortiSIEM Argument Injection to Remote Code Execution☆30Jan 13, 2026Updated last month
- ☆31Jul 26, 2024Updated last year
- Source Code Management Attack Toolkit☆134Sep 20, 2022Updated 3 years ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Some of my custom "tools".☆28Feb 21, 2022Updated 4 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 3 years ago
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- ☆12Jun 16, 2021Updated 4 years ago
- Assorted BloodHound Cypher queries/tricks I haven't seen in other cheat sheets☆12Jun 21, 2021Updated 4 years ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- A fully-undetectable ransomware that utilizes OneDrive & Google Drive to encrypt target local files☆127May 28, 2024Updated last year
- ☆42Nov 13, 2025Updated 3 months ago
- IDATACO IDA Pro Plugin☆46Jun 14, 2016Updated 9 years ago
- ☆49Feb 12, 2026Updated 2 weeks ago