Falco Ruleset Bypass Techniques Research Project Logo

Falco Ruleset Bypass Techniques Research Project

0
Free
Visit Website

This research project explores techniques to bypass the default Falco ruleset (based on Falco v0.28.1) by providing documentation and supporting artifacts in subdirectories. It includes a Dockerfile for the sshayb/fuber:latest image, which is used extensively in the project to demonstrate bypass techniques such as privilege escalation and lateral movement during cluster compromise.

FEATURES

ALTERNATIVES

A series of vulnerable virtual machine images with documentation to teach Linux, Apache, PHP, MySQL security.

Deliberately vulnerable CI/CD environment with 11 challenges to practice security.

One of the oldest hacker conventions in America, offering a unique and personal experience.

Collection of industry and community cybersecurity courses and materials by M. E. Kabay.

Hacker wargames site with forums and tutorials, fostering a learning community.

A comprehensive guide to reverse engineering by Dennis Yurichev, available for free download in multiple languages and formats, with praise from cybersecurity experts.

Intentionally vulnerable Kubernetes cluster environment for learning and practicing Kubernetes security.

edb is a powerful debugger for Linux binaries, enhancing reverse engineering efforts with a user-friendly interface and extensible plugins.