C-h4ck-0 / Kubernetes-DNS-spoofing-POC
Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server
☆14Updated 3 years ago
Related projects: ⓘ
- Keyhack - Golang API token/webhook validator☆16Updated 4 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆84Updated 5 years ago
- PoC for gaining persistency on vulnerable Lambdas☆30Updated 3 years ago
- ☆27Updated 2 months ago
- lightweight CVE search☆21Updated last year
- Golang based web service to scan files with yara rules☆26Updated 7 years ago
- ☆31Updated last year
- An Evil OIDC Server☆49Updated last year
- ☆33Updated 4 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 2 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated 11 months ago
- A Security Scanner for Go☆26Updated 5 years ago
- Run commands over RDP on massive number of hosts☆11Updated 5 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Slides, Cheatsheet and Resources from our Blackhat EU talk☆38Updated 4 years ago
- Kubernetes Pwnage for all☆54Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Updated 5 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆25Updated 2 weeks ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- Some helpful Helm Charts for pentesters☆38Updated 5 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆19Updated last year
- ☆21Updated 5 years ago
- Rosie the Pivoter☆17Updated 6 years ago
- ☆25Updated 3 years ago
- Proof of concept for CVE-2020-15257 in containerd.☆16Updated 3 years ago
- ☆25Updated this week
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆53Updated 2 years ago
- ☆13Updated 11 months ago