Betep0k / CVE-2021-25741
Exploit for CVE-2021-25741 vulnerability
☆28Updated 3 years ago
Alternatives and similar repositories for CVE-2021-25741:
Users that are interested in CVE-2021-25741 are comparing it to the libraries listed below
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆74Updated 10 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆94Updated 4 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 2 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- POC for CVE-2022-23648☆36Updated 2 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- PoC and Detection for CVE-2024-21626☆75Updated last year
- ☆32Updated 2 years ago
- A penetration toolkit for container environment☆77Updated 2 months ago
- ☆18Updated 2 years ago
- kubernetes rootkit☆31Updated last year
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆39Updated 2 years ago
- Here is a common vulnerability when Kubernetes Controller designed.☆12Updated last year
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Detect and bypass Istio sidecar☆20Updated 3 years ago
- Ready to use docker image for CodeQL☆89Updated last year
- Test whether a container environment is vulnerable to container escapes via CVE-2022-0492☆47Updated 3 years ago
- Custom / Experimental CodeQL queries☆37Updated 2 years ago
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- PoC for CVE-2021-43557☆21Updated 3 years ago
- CVE-2021-4204: Linux Kernel eBPF Local Privilege Escalation☆61Updated 3 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- This repository contain any information that can be used to hack Kubernetes☆98Updated 2 years ago
- ☆25Updated 10 months ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆57Updated 2 years ago
- MacOS C2 Framework☆83Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago