Stars
Container image with malware and crypto miner for testing purposes
Monitor Network Traffic Per Executable, Beautifully Visualized
A Linux eBPF rootkit with a backdoor, C2, library injection, execution hijacking, persistence and stealth capabilities.
Set up your own OpenVPN server on Debian, Ubuntu, Fedora, CentOS, Arch Linux and more
kix / reverse-interview
Forked from viraptor/reverse-interviewQuestions to ask the company during your interview
🌙🦊 Dalfox is a powerful open-source XSS scanner and utility focused on automation.
Hundreds of Offensive and Useful Docker Images for Network Intrusion. The name says it all.
Catalogue all images of a Kubernetes cluster to multiple targets with Syft
A swiss army knife CLI tool for interacting with Kafka, RabbitMQ and other messaging systems.
Fast subdomains enumeration tool for penetration testers
Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
Exports the expiration time of your domains as prometheus metrics.
VictoriaMetrics: fast, cost-effective monitoring solution and time series database
A curated list of OPA related tools, frameworks and articles
Boundary enables identity-based access management for dynamic infrastructure.
A simple zero-config tool to make locally trusted development certificates with any names you'd like.
This is just a proof-of-concept project that aims to sign and verify container images using cosign and OPA (Open Policy Agent)
A collection of hacking tools, resources and references to practice ethical hacking.
A high-performance observability data pipeline.
Supply-chain Levels for Software Artifacts
🦙 MegaLinter analyzes 50 languages, 22 formats, 21 tooling formats, excessive copy-pastes, spelling mistakes and security issues in your repository sources with a GitHub Action, other CI tools or l…