Kubernetes pentesting, hardening and hunting tools.
☆80Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Kubernetes-security
Users that are interested in Kubernetes-security are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆20Feb 9, 2024Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆26Dec 24, 2025Updated 4 months ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆93Sep 1, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- Kubernetes focused container assessment and context discovery tool for penetration testing☆480Nov 7, 2025Updated 6 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated 2 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- An SSH honeypot written entirely in Go.☆14Dec 4, 2025Updated 5 months ago
- ☆12Aug 10, 2022Updated 3 years ago
- MLX Implementation of Recursive Reasoning with Tiny Networks☆78Oct 11, 2025Updated 6 months ago
- GitHub Action安全工具,可以将Action Secrets还原拿到明文,用于证明Secrets并不是绝对的安全。(测试通过,放心使用,再有问题来issues区锤我...)☆24Sep 12, 2022Updated 3 years ago
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Custom semgrep rules registry☆14Aug 23, 2022Updated 3 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Cobalt Strike Wrapper☆21Aug 13, 2025Updated 8 months ago
- A collection of all the CTF challenges I have made.☆11Aug 24, 2022Updated 3 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- ☆16Sep 6, 2017Updated 8 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- Monitor the Windows Event Log with grep-like features or filtering for specific Event IDs☆127Mar 26, 2026Updated last month
- ☆61Dec 13, 2025Updated 4 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- a tool to bypass av for red team☆16Apr 21, 2022Updated 4 years ago
- ☆38Apr 7, 2023Updated 3 years ago
- Cobalt Strike teamserver detection.☆16Apr 26, 2021Updated 5 years ago
- Collection of offensive tools targeting Microsoft Azure☆222Apr 1, 2026Updated last month
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 4 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 3 years ago
- Script for importing Nmap results into a Neo4j Graph Database☆24May 1, 2025Updated last year
- ☆12Sep 27, 2018Updated 7 years ago
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆55Apr 1, 2026Updated last month
- Custom mini tools during Red Teaming engagements☆24Mar 7, 2026Updated 2 months ago
- The Shodan MCP Server by ADEO Cybersecurity Services provides cybersecurity professionals with streamlined access to Shodan's powerful re…☆20Mar 22, 2025Updated last year
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 9 months ago
- ☆27Aug 5, 2019Updated 6 years ago
- A Dropper POC with a focus on aiding in EDR evasion, NTDLL Unhooking followed by loading ntdll in-memory, which is present as shellcode (…☆180Feb 10, 2023Updated 3 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆16May 12, 2023Updated 2 years ago