SunWeb3Sec / Kubernetes-securityLinks
Kubernetes pentesting, hardening and hunting tools.
☆71Updated 2 years ago
Alternatives and similar repositories for Kubernetes-security
Users that are interested in Kubernetes-security are comparing it to the libraries listed below
Sorting:
- Source Code Management Attack Toolkit☆222Updated 3 years ago
- This repository contain any information that can be used to hack Kubernetes☆110Updated 3 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆104Updated last week
- ☆113Updated last year
- CVE-2025-1974☆89Updated 6 months ago
- Cloud agnostic IAM permissions enumerator☆156Updated 6 months ago
- ☆110Updated 2 years ago
- ☆100Updated last year
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 4 months ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated 2 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆99Updated last month
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆67Updated last year
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆185Updated last year
- Session Hijacking Visual Exploitation☆207Updated last year
- ☆104Updated 2 years ago
- Kubernetes exploitation tool☆363Updated last year
- Apache Spark Shell Command Injection Vulnerability☆87Updated 3 years ago
- ☆104Updated 2 years ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.☆137Updated 4 months ago
- Mimicry is a dynamic deception tool that actively deceives an attacker during exploitation and post-exploitation.☆57Updated 2 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆77Updated 2 years ago
- ☆24Updated 6 years ago
- Simple tool to decrypt Jenkins encrypted strings☆79Updated 2 years ago
- Damn Vulnerable SCA Application☆39Updated 2 months ago
- Find CVE PoCs on GitHub☆153Updated 2 months ago
- First iteration of ML based Feedback WAF☆59Updated last year
- PoC for CVE-2022-40684 - Authentication bypass lead to Full device takeover (Read-only)☆87Updated 2 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- A webshell application and interactive shell for pentesting Apache Tomcat servers.☆121Updated 7 months ago