Falco Ruleset Bypass Techniques Research Project Logo

Falco Ruleset Bypass Techniques Research Project

0
Free
Visit Website

This research project explores techniques to bypass the default Falco ruleset (based on Falco v0.28.1) by providing documentation and supporting artifacts in subdirectories. It includes a Dockerfile for the sshayb/fuber:latest image, which is used extensively in the project to demonstrate bypass techniques such as privilege escalation and lateral movement during cluster compromise.

FEATURES

ALTERNATIVES

A video-sharing platform for creators to share their content and for users to discover new content, with a focus on cybersecurity.

A weekly newsletter covering computer security news and tutorials

A practical guide to developing a comprehensive security monitoring and incident response strategy, covering incident response fundamentals, threat analysis, and data analysis.

IT certification training for CompTIA exams with free resources.

A comprehensive guide to memory forensics, covering tools, techniques, and procedures for analyzing volatile memory.

A threat intelligence aggregation service that consolidates and summarizes security updates from multiple sources to provide comprehensive cybersecurity situational awareness.

A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries.

A docker container with multiple vulnerable applications for cybersecurity training.

PINNED