cybersecurity

Betterscan – Comprehensive Security Orchestration For Code And Infrastructure

Scan your source code and infra IaC against top security risks Betterscan is a orchestration toolchain that uses state of the art…

5 months ago

SQLRecon – Comprehensive Guide To SQL Server Exploitation And Defense

SQLRecon is a Microsoft SQL Server toolkit that is designed for offensive reconnaissance and post-exploitation. For detailed information on how…

5 months ago

OnMouseMove-HtmlFile-PoC : Unpacking The HTML File Exploit In Russian APT Cyberattacks

PoC for onMouseMove HTML file used in the Russian APT Group campaign targeting Ukraine The HTML File is included as…

5 months ago

AWS CDK – Cloud Development Kit

AWS CDK uses the familiarity and expressive power of programming languages for modeling your applications. It provides high-level components called constructs…

5 months ago

K3S – Lightweight Kubernetes

The docker container runtime must be used to complete some of the included scenarios. K3s uses containerd by default, so…

5 months ago

Microsoft Azure – Cloud Computing Services

Azure Kubernetes Services (AKS) is Microsoft's managed kubernetes offering running on Azure. Explore the robust capabilities of Microsoft Azure in our…

5 months ago

ELFieScanner – Advanced Threat Detection Techniques In Linux Process Memory

A C++ POC for advanced process memory scanning that attempts to detect a number of malicious techniques used by threat…

5 months ago

AWS – Amazon Web Services

Elastic Kubernetes Service (EKS) is a managed kubernetes offering by AWS. Discover how to harness the power of Amazon Web Services…

5 months ago

KiND – Kubernetes IN Docker

kind is a tool for running local Kubernetes clusters using Docker container "nodes". kind was primarily designed for testing Kubernetes itself,…

5 months ago

Kubernetes – Standard Cluster

If you are already having a Kubernetes standard vanilla cluster environment and wanted to set up Kubernetes Goat, then you…

5 months ago