DSecurity / istio-security-restrictions-bypassLinks
Detect and bypass Istio sidecar
☆21Updated 4 years ago
Alternatives and similar repositories for istio-security-restrictions-bypass
Users that are interested in istio-security-restrictions-bypass are comparing it to the libraries listed below
Sorting:
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆102Updated 6 months ago
- ☆52Updated 7 months ago
- ☆11Updated last year
- POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040☆46Updated last month
- PaddingZip is a tool that you can craft a zip file that contains the padding characters between the file content.☆75Updated 3 years ago
- My security presentations☆28Updated 2 years ago
- All in one cybersecurity utility platform.☆24Updated 10 months ago
- 针对kubernetes中的RBAC可能被攻击检测工具。Detection tool for possible attacks on RBAC in kubernetes.☆26Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆87Updated last year
- 多组件客户端☆74Updated 6 months ago
- JDK CVE-2023-21939☆94Updated 2 years ago
- IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploit…☆86Updated 6 months ago
- 🍵 Gitea repository migration remote command execution exploit.☆86Updated 3 years ago
- Reverse-engineer a Dockerfile from a Docker image.☆15Updated 2 years ago
- 一个高价值漏洞采集与推送服务 | A valueable vulnerability collection and push service☆31Updated last year
- Just mindmapping according to official document ( useful for further study )☆27Updated 3 years ago
- Spring Cloud Netflix Hystrix Dashboard template resolution vulnerability CVE-2021-22053☆37Updated 2 years ago
- ☆15Updated 3 months ago
- Use Hive to hijack a Hadoop cluster+☆17Updated 5 years ago
- Attack SQL Server through gopher protocol☆21Updated 3 years ago
- WebLogic vulnerability exploration from beginner to expert.☆156Updated 2 years ago
- 编译原理学习代码仓库☆23Updated 3 years ago
- ☆16Updated 4 years ago
- Finding Java gadget chains with CodeQL☆183Updated 10 months ago
- Go-sec-code is a project for learning Go vulnerability code.☆48Updated 2 years ago
- cve-2022-34169 延伸出的Jdk Xalan的payload自动生成工具,可根据不同的Jdk生成出其所对应的xslt文件☆90Updated 2 years ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆35Updated 3 years ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆39Updated last year
- Spring-Kafka-Deserialization-Remote-Code-Execution☆31Updated 2 years ago
- The Poc for CVE-2024-20931☆74Updated last year