A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
This research project explores techniques to bypass the default Falco ruleset (based on Falco v0.28.1) by providing documentation and supporting artifacts in subdirectories. It includes a Dockerfile for the sshayb/fuber:latest image, which is used extensively in the project to demonstrate bypass techniques such as privilege escalation and lateral movement during cluster compromise.
A comprehensive guide to understanding and responding to modern ransomware attacks, covering incident response, cyber threat intelligence, and forensic analysis.
A live archive of DEF CON CTF challenges, vulnerable by design, for hackers to play safely.
A comprehensive guide to using Metasploit, including searching for modules, specifying exploits and payloads, and using auxiliary modules.
A comprehensive guide to Python 3 syntax, features, and resources in a single image.
A practical guide to enhancing digital investigations with cutting-edge memory forensics techniques, covering fundamental concepts, tools, and techniques for memory forensics.
Innovative hub for cybersecurity events and initiatives.