SunWeb3Sec / Kubernetes-security
Kubernetes pentesting, hardening and hunting tools.
☆63Updated 2 years ago
Alternatives and similar repositories for Kubernetes-security:
Users that are interested in Kubernetes-security are comparing it to the libraries listed below
- ☆31Updated 2 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆63Updated 7 months ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆86Updated last year
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated last year
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 2 years ago
- This repository contain any information that can be used to hack Kubernetes☆101Updated 2 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- Burp Suite's extension to scan and crawl Single Page Applications☆103Updated 2 years ago
- ☆35Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆72Updated 2 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆75Updated 2 years ago
- An extension to use Semgrep inside Burp Suite.☆88Updated last year
- ☆111Updated 2 years ago
- oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning☆68Updated 4 months ago
- Nuclei templates for K8S security scanning☆101Updated 3 years ago
- CVE Collection of jQuery UI XSS Payloads☆120Updated 2 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 2 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆93Updated 10 months ago
- ☆113Updated last year
- Simple tool to decrypt Jenkins encrypted strings☆75Updated last year
- Repository of CVE found by OCD people☆76Updated 9 months ago
- PoC repository for CVE-2023-29007☆33Updated 2 years ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆72Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- ☆76Updated 11 months ago
- Determine privileges from cloud credentials via brute-force testing.☆67Updated 8 months ago
- Cloud Exploit Framework☆113Updated 2 years ago
- Web cache poisoning vulnerability scanner.☆66Updated 2 years ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆179Updated last year