Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
☆19May 6, 2024Updated last year
Alternatives and similar repositories for ExcessivePermissionAttack
Users that are interested in ExcessivePermissionAttack are comparing it to the libraries listed below
Sorting:
- Bugs in Pods: Understanding Bugs in Container Runtime Systems (ISSTA 2024)☆19Aug 4, 2024Updated last year
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- A Java implementation of in-toto runlib☆11Jul 23, 2024Updated last year
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- Kubernetes 集群部署 - 一镜到底纯手工部署 K8S 学习集群工作原理☆11Jan 12, 2025Updated last year
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- ☆12Sep 27, 2018Updated 7 years ago
- RecoveryGPT - Revive your ChatGPT conversations with elegance and full privacy!☆14Nov 26, 2023Updated 2 years ago
- A plugin that enhances tmux search☆11Oct 23, 2017Updated 8 years ago
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆18Jul 19, 2025Updated 7 months ago
- Network bridge between RTI and Savant.☆11Apr 10, 2015Updated 10 years ago
- Mattermost builder☆11Jan 1, 2022Updated 4 years ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆60Aug 7, 2024Updated last year
- 大模型辅助SAST静态代码分析的Demo系统☆13Feb 19, 2025Updated last year
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- ☆18Feb 2, 2023Updated 3 years ago
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- An query language and interactive tooling to work with SBOM data.☆15Oct 7, 2024Updated last year
- Code for ICSE'24 Paper☆14Apr 21, 2024Updated last year
- Release model of the Linux kernel☆15Aug 3, 2020Updated 5 years ago
- Privateer is a plugin-based framework to validate the status of deployed resources.☆18Updated this week
- Supply Chain Query Tool☆13May 25, 2022Updated 3 years ago
- Simple SSH based Git cache☆14Apr 6, 2018Updated 7 years ago
- Profile nodejs applications with kcachegrind, either using the nodegrind wrapper or the more targeted profiling module.☆25Jun 15, 2017Updated 8 years ago
- WASEM - a general symbolic execution framework for WebAssembly (WASM) binaries☆18Sep 30, 2024Updated last year
- A local Google Cloud Build Local runner for non-production and development purposes based on the original (now archived) Google resposito…☆16Mar 3, 2025Updated 11 months ago
- Open Source Maturity Model☆16Apr 30, 2024Updated last year
- ☆18Feb 19, 2026Updated last week
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- An easy way to give all your EC2 instances SSH host certificates☆16Feb 25, 2023Updated 3 years ago
- URLs previewer browser extension for https://workflowy.com/☆14Jan 7, 2023Updated 3 years ago
- python多进程爬虫+文件/SQL存储☆10Mar 7, 2022Updated 3 years ago
- MCPCorpus is a comprehensive dataset for analyzing the Model Context Protocol (MCP) ecosystem, containing ~14K MCP servers and 300 MCP cl…☆32Sep 1, 2025Updated 6 months ago
- Deterministic record and replay and tracing of syzkaller bug reproducers☆20Apr 25, 2025Updated 10 months ago
- Onsite Analysis Infrastructure☆16Jun 23, 2020Updated 5 years ago
- All my public vulnerabilities.☆14Jan 9, 2021Updated 5 years ago
- ☆28Sep 11, 2025Updated 5 months ago
- ESP AMP☆22Dec 1, 2025Updated 3 months ago