SunWeb3Sec / Kubernetes-securityLinks
Kubernetes pentesting, hardening and hunting tools.
☆76Updated 3 years ago
Alternatives and similar repositories for Kubernetes-security
Users that are interested in Kubernetes-security are comparing it to the libraries listed below
Sorting:
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- ☆114Updated 2 years ago
- Cloud Exploit Framework☆113Updated 3 years ago
- This repository contain any information that can be used to hack Kubernetes☆111Updated 3 years ago
- CVE-2025-1974☆90Updated 10 months ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆186Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆77Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆161Updated 9 months ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 5 months ago
- Kubernetes exploitation tool☆364Updated last year
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆90Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆118Updated 4 months ago
- ☆43Updated 2 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆64Updated 8 months ago
- Repository to store exploits created by Assetnotes Security Research team☆180Updated 2 years ago
- POC for CVE-2022-47966 affecting multiple ManageEngine products☆128Updated 3 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- VMware Aria Operations for Logs CVE-2023-34051☆61Updated 2 years ago
- Python script for automating the creation of serverless cloud redirectors from Cobalt Strike malleable C2 profiles☆202Updated last year
- CVE-2024-3400 Palo Alto OS Command Injection☆161Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87Updated 3 years ago
- ☆154Updated last month
- ☆104Updated 3 years ago
- Golden collection of weak passwords☆71Updated last year
- CVE-2023-33733 reportlab RCE☆119Updated 2 years ago
- Apache Spark Shell Command Injection Vulnerability☆88Updated 3 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆48Updated 3 years ago