Esonhugh / KubernetesCRInjection
Here is a common vulnerability when Kubernetes Controller designed.
☆11Updated last year
Alternatives and similar repositories for KubernetesCRInjection
Users that are interested in KubernetesCRInjection are comparing it to the libraries listed below
Sorting:
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆75Updated last year
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆98Updated 3 weeks ago
- Powerful+Fast+Low Privilege Kubernetes discovery tools☆222Updated last week
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆39Updated 8 months ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-…☆74Updated last week
- A penetration toolkit for container environment☆77Updated 2 weeks ago
- ☆48Updated last month
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- linux ebpf backdoor demo☆10Updated 5 months ago
- FakeToaGo☆11Updated last year
- 云原生 安全漏洞收集☆13Updated last month
- ☆11Updated 11 months ago
- Cloud Native Security News☆63Updated 4 months ago
- My security presentations☆28Updated last year
- 针对kubernetes中的RBAC可能被攻击检测工具。Detection tool for possible attacks on RBAC in kubernetes.☆26Updated last year
- 读过的安全文章离线归档 | begin in 2023.11.23☆16Updated 11 months ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- Spring-Kafka-Deserialization-Remote-Code-Execution☆30Updated last year
- 内存加载执行golang elf二进制文件☆27Updated 3 years ago
- Java Agent memory horse scanner combined with Call Graph modus☆62Updated 2 years ago
- ☆13Updated last week
- Reverse-engineer a Dockerfile from a Docker image.☆15Updated last year
- A script for installing and switching multiple java versions on Linux x86_64, suitable for code audit workers.☆21Updated last year
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆20Updated last year
- The Poc for CVE-2024-20931☆73Updated last year
- 容器安全漏洞的分析与复现☆158Updated last year
- Topic: The Swiss Army Knife of Java Exploitation☆22Updated 2 months ago
- ☆18Updated 4 months ago
- ☆45Updated 3 years ago