Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server
☆15Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for Kubernetes-DNS-spoofing-POC
Users that are interested in Kubernetes-DNS-spoofing-POC are comparing it to the libraries listed below
Sorting:
- Comet is an alert distribution framework which allows you to distribute alerts all the way to the resource owner with customizable owner …☆21Aug 23, 2022Updated 3 years ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- ☆27Feb 19, 2026Updated 2 weeks ago
- Offline Security Client☆12Feb 10, 2026Updated last month
- A Modest Content Security Proposal☆41Aug 31, 2021Updated 4 years ago
- ☆37Dec 26, 2021Updated 4 years ago
- Finders Keypers: AWS KMS Encryption Key Usage and Blast Radius Finder☆45Aug 13, 2025Updated 6 months ago
- A microframework based on fasthttp☆12Sep 26, 2023Updated 2 years ago
- Web interface to IntelMQ☆10Sep 10, 2025Updated 6 months ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- CEX.IO API integration. PHP sources.☆21Oct 16, 2017Updated 8 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- A thread dump analyzer tool running on your browser or in your JVM that generates DOT documents out of `jstack` outputs.☆10Jul 10, 2024Updated last year
- Fag ol fra mastern☆10Jul 3, 2019Updated 6 years ago
- Simple implementation of an AppSec Pipeline using the Gasp library☆13Sep 8, 2019Updated 6 years ago
- TEDI is TEHIK design system☆13Oct 10, 2025Updated 5 months ago
- ☆10Nov 12, 2020Updated 5 years ago
- CuanticoSecurity☆10Sep 7, 2016Updated 9 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Security Cloud Assessment Tool☆11Jun 28, 2020Updated 5 years ago
- An AWS Lambda function created in Python 2.7 that triggers on CloudWatch Event of an EC2 instance starting and takes the Public IPv4 Addr…☆10Oct 25, 2018Updated 7 years ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Scanner for misconfigured DevSecOps or Security tools on internet like SonarQube, GoPhish etc.☆12Apr 4, 2025Updated 11 months ago
- Helper to automatically join members of a StatefulSet into a CouchDB cluster☆10Aug 14, 2019Updated 6 years ago
- ☆13Aug 28, 2018Updated 7 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆14Mar 8, 2021Updated 5 years ago
- Демо-пример шаблона для реализации пайплайна нагрузочного тестирования в GitLab CI. Статья в блоге:☆10Nov 15, 2019Updated 6 years ago
- Burp Enterprise Toolkit☆12Feb 25, 2022Updated 4 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Provider for using Pulumi with Hetzner Cloud☆10Apr 26, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- POP3 server library for Go☆11Feb 16, 2016Updated 10 years ago