This post lists out popular K8s security tools. The list will be updated regularly.
Here is a summary of Kubernetes Security Controls.
Calisec Team won Splunk Boss of the SOC (BOTS) Day 2019 (San Jose)...
To modify a Windows EXE file and save an altered version containing Trojan code in a new PE section without breaking the program.
- Create a custom crypter like the one shown in the “crypters” video - Free to use any exisSng encrypSon schema - Can use any programming language
- Take up 3 shellcodes from Shell-Storm and create polymorphic versions of them to beat paLern matching - The polymorphic versions cannot be larger 150% of the exisSng shellcode - Bonus points for making it shorter in length than original