SunWeb3Sec / Kubernetes-securityLinks
Kubernetes pentesting, hardening and hunting tools.
☆68Updated 2 years ago
Alternatives and similar repositories for Kubernetes-security
Users that are interested in Kubernetes-security are comparing it to the libraries listed below
Sorting:
- This repository contain any information that can be used to hack Kubernetes☆108Updated 3 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- ☆113Updated last year
- GATOR - GCP Attack Toolkit for Offensive Research, a tool designed to aid in research and exploiting Google Cloud Environments☆90Updated last year
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆65Updated 9 months ago
- Worlds First Public POC for CVE-2025-1974☆89Updated 3 months ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Apache Spark Shell Command Injection Vulnerability☆88Updated 2 years ago
- Cloud agnostic IAM permissions enumerator☆150Updated 3 months ago
- ☆113Updated 2 years ago
- ☆31Updated 2 years ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- ☆104Updated 2 years ago
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆100Updated last year
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆89Updated last month
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- A robust Red Team proxy written in Go.☆159Updated 3 years ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- PoC repository for CVE-2023-29007☆33Updated 2 years ago
- Simple tool to decrypt Jenkins encrypted strings☆76Updated 2 years ago
- ☆23Updated 2 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Proof of Concept for Path Traversal in Apache Struts ("CVE-2023-50164")☆57Updated last year
- Tool to spray AWS Console IAM Logins☆29Updated 3 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆2Updated last year
- ☆94Updated 2 years ago
- VMware Aria Operations for Logs CVE-2023-34051☆63Updated last year