Kubernetes pentesting, hardening and hunting tools.
☆77Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Kubernetes-security
Users that are interested in Kubernetes-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A curated list of awesome of the Foundry development framework.☆40Sep 20, 2023Updated 2 years ago
- USIM, EDITOR, IMSI, ICCID, MCC/MNC, SPN, GID1, GID2☆15Mar 8, 2020Updated 6 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆478Nov 7, 2025Updated 4 months ago
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- On-chain test DeFi using Foundry☆225Jun 11, 2023Updated 2 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- ☆17Jun 28, 2023Updated 2 years ago
- An SSH honeypot written entirely in Go.☆13Dec 4, 2025Updated 3 months ago
- ☆12Aug 10, 2022Updated 3 years ago
- MLX Implementation of Recursive Reasoning with Tiny Networks☆79Oct 11, 2025Updated 5 months ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Cobalt Strike Wrapper☆20Aug 13, 2025Updated 7 months ago
- A collection of all the CTF challenges I have made.☆11Aug 24, 2022Updated 3 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- ☆61Dec 13, 2025Updated 3 months ago
- a tool to bypass av for red team☆16Apr 21, 2022Updated 3 years ago
- 各大主流平台数字货币价 涨幅/跌幅 及时提醒,短信提醒服务☆10May 26, 2018Updated 7 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 4 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Collection of offensive tools targeting Microsoft Azure☆220Jan 18, 2023Updated 3 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆21Mar 22, 2025Updated last year
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 weeks ago
- This is just a simple data recovery for Foxmail(http://foxmail.com.cn/)☆18Oct 16, 2015Updated 10 years ago
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 8 months ago
- ☆27Aug 5, 2019Updated 6 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆180Feb 10, 2023Updated 3 years ago
- Just another repository for malware development☆13May 12, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Sample pipeline demo highlighting how to integrate Falcon Container Sensor into ECS Fargate Workloads☆11Nov 15, 2024Updated last year
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Aug 21, 2023Updated 2 years ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from the command line or programmatically. This For…☆24Nov 30, 2021Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago