SunWeb3Sec / Kubernetes-securityLinks
Kubernetes pentesting, hardening and hunting tools.
☆65Updated 2 years ago
Alternatives and similar repositories for Kubernetes-security
Users that are interested in Kubernetes-security are comparing it to the libraries listed below
Sorting:
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆64Updated 9 months ago
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- This repository contain any information that can be used to hack Kubernetes☆105Updated 3 years ago
- ☆113Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆29Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆69Updated 10 months ago
- Cloud agnostic IAM permissions enumerator☆149Updated 2 months ago
- Tool to spray AWS Console IAM Logins☆29Updated 3 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆55Updated last year
- ☆86Updated 2 months ago
- Improve automated and semi-automated active scanning in Burp Pro☆61Updated 3 weeks ago
- A project for fuzzing HTTP/1.1 CL.0 Request Smuggling Attack Vectors☆87Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆174Updated 8 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- A fingerprint generation helper for nuclei network templates☆73Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆94Updated last year
- ☆16Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- A Burp Suite Extension for Application Penetration Testing to map flows and vulnerabilities☆117Updated last year
- WAF bypass PoC☆48Updated last year
- ☆81Updated 10 months ago
- Damn Vulnerable SCA Application☆37Updated 2 weeks ago
- Golden collection of weak passwords☆62Updated 6 months ago
- Nuclei templates for K8S security scanning☆101Updated 3 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 2 years ago
- Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage…☆86Updated 2 weeks ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated 2 months ago
- Nuclear Pond is a utility leveraging Nuclei to perform internet wide scans for the cost of a cup of coffee.☆181Updated last year