C-h4ck-0 / Kubernetes-DNS-spoofing-POCLinks
Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server
☆14Updated 4 years ago
Alternatives and similar repositories for Kubernetes-DNS-spoofing-POC
Users that are interested in Kubernetes-DNS-spoofing-POC are comparing it to the libraries listed below
Sorting:
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 7 months ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- ☆27Updated 2 months ago
- Keyhack - Golang API token/webhook validator☆17Updated 3 months ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- lightweight CVE search☆21Updated 2 years ago
- A Golang library for interacting with the EPSS (Exploit Prediction Scoring System).☆28Updated 4 months ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Updated 6 years ago
- Open Source runtime tool which help to detect malware code execution and run time mis-configuration change on a kubernetes cluster☆36Updated 3 years ago
- egrets monitors egress☆46Updated 5 years ago
- A Security Scanner for Go☆26Updated 6 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 7 months ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- ☆31Updated 2 years ago
- INTERCEPT / Policy as Code Auditing & Compliance☆84Updated last month
- CloudSpec is an open source tool for validating your resources in your cloud providers using a logical language.☆26Updated 3 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- Vulnerability Scanner for Detecting Publicly Disclosed Vulnerabilities in Application Dependencies☆23Updated 6 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- ☆42Updated 2 months ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 5 years ago
- fast, zero config web endpoint change monitor☆43Updated 4 years ago
- OpenCSPM Community Controls☆14Updated 4 years ago
- ☆25Updated 4 years ago
- Golang based web service to scan files with yara rules☆26Updated 8 years ago
- Dependency Combobulator☆93Updated last year
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago