Betep0k / CVE-2021-25741Links
Exploit for CVE-2021-25741 vulnerability
☆28Updated 3 years ago
Alternatives and similar repositories for CVE-2021-25741
Users that are interested in CVE-2021-25741 are comparing it to the libraries listed below
Sorting:
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆87Updated last year
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆98Updated 5 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- POC for CVE-2022-23648☆37Updated 3 years ago
- A penetration toolkit for container environment☆116Updated 2 weeks ago
- PoC and Detection for CVE-2024-21626☆75Updated last year
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 5 years ago
- Test whether a container environment is vulnerable to container escapes via CVE-2022-0492☆48Updated 3 years ago
- ☆31Updated 2 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆114Updated 6 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆15Updated 2 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 3 years ago
- ☆44Updated 6 months ago
- This repository contain any information that can be used to hack Kubernetes☆110Updated 3 years ago
- collections of container escape techniques 🐿☆72Updated 4 years ago
- Here is a common vulnerability when Kubernetes Controller designed.☆11Updated last year
- Ready to use docker image for CodeQL☆90Updated last year
- Proof of concept for CVE-2020-15257 in containerd.☆18Updated 4 years ago
- ZDI presentations, publications, whitepapers etc☆61Updated 11 months ago
- Simple tool to decrypt Jenkins encrypted strings☆79Updated 2 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- Leaky Vessels Dynamic Detector☆103Updated 7 months ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆59Updated 3 years ago
- Cisco ASA Software and ASDM Security Research☆86Updated 3 years ago
- DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)☆100Updated 4 years ago
- Tool to pentest spark clusters☆32Updated last year
- Kubernetes offensive framework built in eBPF☆39Updated 2 years ago
- An exploit for CVE-2022-42475, a pre-authentication heap overflow in Fortinet networking products☆36Updated 2 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 11 months ago