C-h4ck-0 / Kubernetes-DNS-spoofing-POC
Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server
☆14Updated 4 years ago
Alternatives and similar repositories for Kubernetes-DNS-spoofing-POC:
Users that are interested in Kubernetes-DNS-spoofing-POC are comparing it to the libraries listed below
- ☆32Updated 2 years ago
- Golang based web service to scan files with yara rules☆27Updated 7 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 3 months ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Keyhack - Golang API token/webhook validator☆16Updated this week
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- lightweight CVE search☆21Updated 2 years ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 4 years ago
- Execute tasks across SSH hosts using random selection☆17Updated 4 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- ☆27Updated 4 months ago
- egrets monitors egress☆46Updated 4 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- Kubernetes offensive framework built in eBPF☆37Updated 2 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- SonicWall VPN-SSL Exploit* using Golang ( * and other targets vulnerable to shellshock ).☆18Updated 4 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.☆47Updated 6 months ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆57Updated 2 years ago
- Python script for privilege escalation for Python☆11Updated 4 years ago
- Custom semgrep rules registry☆11Updated 2 years ago
- OpenCSPM Community Controls☆14Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago