ProfessionallyEvil / LD_PRELOAD-run-at-load-time
Code samples to go along with the blog post on how to run code at load/unload time when using LD_PRELOAD to inject libraries.
☆11Updated 2 years ago
Alternatives and similar repositories for LD_PRELOAD-run-at-load-time:
Users that are interested in LD_PRELOAD-run-at-load-time are comparing it to the libraries listed below
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- Dynamic Outbound Firewall Authorizer☆22Updated 2 years ago
- ☆6Updated 8 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 2 months ago
- lightweight CVE search☆21Updated last year
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆14Updated 4 years ago
- Docker Secure Computing Profile Generator☆48Updated 3 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 7 years ago
- Keyhack - Golang API token/webhook validator☆16Updated 5 years ago
- egrets monitors egress☆46Updated 4 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago
- ☆16Updated 4 years ago
- Source files found after a recent hack of one of my machines, showing how the infection spreads itself and what it does, useful for analy…☆13Updated 4 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- ☆31Updated 2 years ago
- Proof of concept for vulnerability management of Docker containers☆16Updated 7 years ago
- Simplified NAT Slipstream server and client☆20Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 5 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linux☆56Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 4 months ago
- An eBPF detection program for CVE-2022-0847☆28Updated 2 years ago
- A command-line application to generate random user agent strings.☆17Updated 4 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- ☆25Updated 9 months ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Custom semgrep rules registry☆11Updated 2 years ago
- Tiny library to parse the subdomain, domain, and tld extension from a host string☆23Updated 2 years ago