ruzickap / malware-cryptominer-containerLinks
Container image with malware and crypto miner for testing purposes
☆44Updated last week
Alternatives and similar repositories for malware-cryptominer-container
Users that are interested in malware-cryptominer-container are comparing it to the libraries listed below
Sorting:
- Cloud Offensive Breach and Risk Assessment (COBRA) Tool☆94Updated 2 months ago
- CNAPPgoat is an open source project designed to modularly provision vulnerable-by-design components in cloud environments.☆286Updated 11 months ago
- MetaHub is an automated contextual security findings enrichment and impact evaluation tool for vulnerability management.☆174Updated last week
- A curated list of resources about detecting threats and defending Kubernetes systems.☆389Updated last year
- ☆179Updated 3 months ago
- Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments☆143Updated 7 months ago
- Generate datasets of cloud audit logs for common attacks☆217Updated last year
- kubernetes-for-soc aims to fast-track the learning curve for SOC analysts by enabling them to swiftly grasp the essential concepts and kn…☆54Updated last year
- DeRF (Detection Replay Framework) is an "Attacks As A Service" framework, allowing the emulation of offensive techniques and generation o…☆100Updated last year
- 🧰 Multi Tool Kubernetes Pentest Image☆243Updated 3 months ago
- Released at Black Hat Asia on April 18, 2024, Cloud Console Cartographer is a framework for condensing groupings of cloud events (e.g. Cl…☆168Updated last year
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆164Updated last week
- A full insecure kubernetes application for testing security tools☆89Updated 3 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆83Updated last year
- A guide to simplify the process of evaluating Datadog's Cloud SIEM security capabilities to detect AWS threats.☆19Updated 2 years ago
- Curating Falco rules with MITRE ATT&CK Matrix☆82Updated last year
- This is a collection of threat detection rules / rules engines that I have come across.☆294Updated last year
- KaiMonkey provides vulnerable infrastructure as code (IaC) to help explore and understand common cloud security threats exposed via IaC.☆103Updated last year
- A collection of technical and sales resources related to Prisma Cloud Compute and Prisma Cloud Enterprise created for the PANW Channel Pa…☆73Updated 7 months ago
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆109Updated 8 months ago
- Simple Workspace Attack Tool (SWAT) is a tool for simulating malicious behavior against Google Workspace in reference to the MITRE ATT&CK…☆164Updated 10 months ago
- A tool for AWS incident response, that allows for enumeration, acquisition and analysis of data from AWS environments for the purpose of …☆192Updated 10 months ago
- Best practice example for secure and compliant Google Cloud Platform infrastructure☆104Updated 2 years ago
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.☆104Updated last year
- ☆74Updated 4 months ago
- cloudgrep is grep for cloud storage☆326Updated 5 months ago
- A tool to uncover undocumented APIs from the AWS Console.☆112Updated 3 months ago
- Red Teaming for AI and Cloud☆191Updated 2 months ago
- An AWS IAM policy statement parser and query tool.☆193Updated last month
- The Prisma Cloud CLI is a command line interface for Prisma Cloud by Palo Alto Networks.☆42Updated 4 months ago