Falco Ruleset Bypass Techniques Research Project Logo

Falco Ruleset Bypass Techniques Research Project

0
Free
Updated 11 March 2025
Visit Website

This research project explores techniques to bypass the default Falco ruleset (based on Falco v0.28.1) by providing documentation and supporting artifacts in subdirectories. It includes a Dockerfile for the sshayb/fuber:latest image, which is used extensively in the project to demonstrate bypass techniques such as privilege escalation and lateral movement during cluster compromise.

FEATURES

SIMILAR TOOLS

A detailed manual for cybersecurity professionals focusing on red team, OSINT, and blue team strategies.

Innovative hub for cybersecurity events and initiatives.

A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.

Free online ethical hacking course covering penetration testing, web app assessments, exploit development, and security operations.

A comprehensive list of search filters for the SHODAN search engine.

A repository aiming to archive all Android security presentations and whitepapers from conferences.

A curated list documenting open-source projects that incorporate political protests in their software, ranging from messages to conditional malware.

A blog post discussing the differences between Solaris Zones, BSD Jails, VMs, and containers, with the author arguing that containers are not a real thing.

A collection of lab scripts and files for learning about containers and container internals.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved