C-h4ck-0 / Kubernetes-DNS-spoofing-POCView external linksLinks
Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server
☆15Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for Kubernetes-DNS-spoofing-POC
Users that are interested in Kubernetes-DNS-spoofing-POC are comparing it to the libraries listed below
Sorting:
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆21Aug 23, 2022Updated 3 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- ☆27Oct 1, 2025Updated 4 months ago
- Offline Security Client☆12Feb 10, 2026Updated last week
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- A Modest Content Security Proposal☆41Aug 31, 2021Updated 4 years ago
- ☆37Dec 26, 2021Updated 4 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- CEX.IO API integration. PHP sources.☆21Oct 16, 2017Updated 8 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 5 months ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- TEDI is TEHIK design system☆13Oct 10, 2025Updated 4 months ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- ☆10Nov 12, 2020Updated 5 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Scanner for misconfigured DevSecOps or Security tools on internet like SonarQube, GoPhish etc.☆12Apr 4, 2025Updated 10 months ago
- Query CSV files with SQL.☆11Oct 15, 2018Updated 7 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- List your tfsec issues in the QuickFix window with this plugin.☆12May 16, 2022Updated 3 years ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Nov 1, 2023Updated 2 years ago
- Демо-пример шаблона для реализации пайплайна нагрузочного тестирования в GitLab CI. Статья в блоге:☆10Nov 15, 2019Updated 6 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 3 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- SoC-independent part of the iso7816 stack☆13Feb 28, 2024Updated last year
- Palestra sobre desenvolvimento seguro de imagens e containers para a DockerCon 2021 sala Brasil☆10May 27, 2021Updated 4 years ago
- Provider for using Pulumi with Hetzner Cloud☆10Apr 26, 2019Updated 6 years ago
- Security Scanning Samples with cnspec, cnquery, and Mondoo Platform☆16Feb 4, 2026Updated 2 weeks ago
- vulnerability reporting tool powered by vulners.com and wpvulndb.com☆12Aug 31, 2022Updated 3 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- PPT of my talks.☆13Jun 23, 2025Updated 7 months ago
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago