1d8's starred repositories
dockerscan
Docker security analysis & hacking tools
malicious-docker
Intentionally "malicious" Docker image for EDR testing
elk-docker
Elasticsearch, Logstash, Kibana (ELK) Docker image
go-systemd
Go bindings to systemd socket activation, journal, D-Bus, and unit files
KippoAttackerDownloads
These are files that attackers attempted to download onto my kippo instance
ProcMon-for-Linux
Procmon is a Linux reimagining of the classic Procmon tool from the Sysinternals suite of tools for Windows. Procmon provides a convenient and efficient way for Linux developers to trace the syscall activity on the system.
trufflehog
Find and verify secrets
kube-hunter
Hunt for security weaknesses in Kubernetes clusters
accrescent
A novel Android app store focused on security, privacy, and usability
nim-syscall
Raw system calls for Nim
NimExamples
A collection of offensive Nim example code
BSidesRoc2022_Linux_Malware_Analysis_Course
BSidesRoc 2022 Linux Malware/Forensics Course
PayloadsAllTheThings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Privilege-Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
awesome-malware-development
Organized list of my malware development resources
python-mpv
Python interface to the awesome mpv media player
100-redteam-projects
Projects for security students
aws-lambda-go
Libraries, samples and tools to help Go developers develop AWS Lambda functions.