Kubernetes pentesting, hardening and hunting tools.
☆76Dec 27, 2022Updated 3 years ago
Alternatives and similar repositories for Kubernetes-security
Users that are interested in Kubernetes-security are comparing it to the libraries listed below
Sorting:
- A curated list of awesome of the Foundry development framework.☆40Sep 20, 2023Updated 2 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- ☆20Feb 9, 2024Updated 2 years ago
- A curated list of blockchain security Capture the Flag (CTF) competitions☆92Sep 1, 2023Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆25Dec 24, 2025Updated 2 months ago
- Cryptanalysis of the DAO exploit & Multi-Stage Attack☆19Apr 3, 2024Updated last year
- EVM in python from scratch because why not☆11Aug 22, 2022Updated 3 years ago
- Application for detecting command and control (C2) communication through network traffic analysis.☆15May 12, 2023Updated 2 years ago
- Tool to perform differential fault analysis attack (DFA) on whiteboxes with external encodings.☆16Feb 10, 2023Updated 3 years ago
- ☆17Jun 28, 2023Updated 2 years ago
- Progress of learning kernel development☆14Nov 20, 2022Updated 3 years ago
- Zero-knowledge Range Proof☆16Nov 16, 2017Updated 8 years ago
- A blog for LLVM(v11.0.0) beginner, step by step, with detailed documents and comments. Record the way I learn LLVM.☆14Jun 17, 2022Updated 3 years ago
- ☆12Aug 10, 2022Updated 3 years ago
- On-chain test DeFi using Foundry☆224Jun 11, 2023Updated 2 years ago
- Malkom is an extensible and simple similarity graph generator for malware analysis aimed at helping analysts visualize and cluster sets o…☆17Apr 6, 2023Updated 2 years ago
- Red Team Server (RTS)☆16Mar 8, 2024Updated last year
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- Cobalt Strike Wrapper☆20Aug 13, 2025Updated 6 months ago
- POC for CVE-2022-21907: HTTP Protocol Stack Remote Code Execution Vulnerability.☆17Jun 18, 2025Updated 8 months ago
- This is just a simple data recovery for Foxmail(http://foxmail.com.cn/)☆18Oct 16, 2015Updated 10 years ago
- a tool to bypass av for red team☆16Apr 21, 2022Updated 3 years ago
- ☆24Mar 20, 2023Updated 2 years ago
- A tool for steganography of png files .☆24Jul 27, 2022Updated 3 years ago
- ULPatch is open source user space live patch tool.☆13Jan 11, 2026Updated last month
- Small utility package for manipulating Windows process tokens☆26Apr 26, 2022Updated 3 years ago
- Venom is a collaborative C2 framework used by Red Team operators. providing an interactive Web GUI written in Python and PowerShell.☆19Jul 14, 2022Updated 3 years ago
- Lord Of Active Directory - automatic vulnerable active directory on AWS☆150Oct 21, 2023Updated 2 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- Presentation slides, blogs, and videos of my conference presentations.☆26Jan 31, 2024Updated 2 years ago
- ☆62Dec 13, 2025Updated 2 months ago
- Checklist for security audit of tron projects by @positivesecurity☆26Sep 11, 2024Updated last year
- A collection of my security audits☆55Jul 25, 2025Updated 7 months ago
- "ACCESS LIST" Bypass collections used during pentesting, gathered in one place. The list types include tools, usernames, passwords, comb…☆37Feb 19, 2026Updated 2 weeks ago
- ☆27Aug 5, 2019Updated 6 years ago
- ☆27May 14, 2022Updated 3 years ago
- windows 扫雷程序外挂(内存挂+模拟挂),用于学习Windows 逆向工程原理☆22Nov 1, 2018Updated 7 years ago
- WEB API fuzzing☆23Apr 30, 2025Updated 10 months ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago