Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
☆19May 6, 2024Updated last year
Alternatives and similar repositories for ExcessivePermissionAttack
Users that are interested in ExcessivePermissionAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bugs in Pods: Understanding Bugs in Container Runtime Systems (ISSTA 2024)☆19Aug 4, 2024Updated last year
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- ☆10Sep 25, 2024Updated last year
- ☆15May 26, 2021Updated 4 years ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- ☆18Feb 2, 2023Updated 3 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 8 months ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆60Aug 7, 2024Updated last year
- ☆28Nov 16, 2021Updated 4 years ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- 云原生安全漏洞☆17Sep 9, 2025Updated 6 months ago
- ☆17Jul 25, 2024Updated last year
- 狂神说MD笔记☆13Mar 7, 2021Updated 5 years ago
- configuration evolution dataset☆18Feb 25, 2021Updated 5 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- GEF - GDB Enhanced Features for exploit devs & reversers☆27Mar 9, 2024Updated 2 years ago
- Code and data for the USENIX 2025 paper "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating…☆24Aug 12, 2025Updated 7 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Use ICMP requests to check the alive subnet.☆23Jul 26, 2021Updated 4 years ago
- Various examples of using eBPF code☆18Jan 3, 2024Updated 2 years ago
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆17Apr 26, 2021Updated 4 years ago
- The container escape challenge of Be A RWCTFer competition (https://be-a-rwctfer.realworldctf.com/)☆61Mar 20, 2025Updated last year
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- ☆23Mar 25, 2019Updated 6 years ago
- Speaker-listener Label Propagation Algorithm Implemented in Python☆15Oct 31, 2013Updated 12 years ago
- ICSE 2020 Artifact for: Learning from, Understanding, and Supporting DevOps Artifacts for Docker☆24Dec 8, 2022Updated 3 years ago
- vArmor is a cloud native container sandbox system based on AppArmor/BPF/Seccomp. It also includes multiple built-in protection rules that…☆451Updated this week
- Golang 写的免杀框架,通过系统调用等手法bypass AV/EDR☆23Jul 11, 2024Updated last year
- CheckCdn 完善的CDN信息分析工具 基于EDNS、ASN、CNAME、IPlocate等多个维度筛选☆40Mar 16, 2026Updated last week
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- ☆22Jul 24, 2025Updated 7 months ago
- Bootstrap Kubernetes the hard way on self-hosted bare-metal (or VM) cluster -- forked and modified from Kelsey Hightower's tutorial☆15Feb 19, 2019Updated 7 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Malicious domain name detection based on tensorflow☆36Jan 6, 2018Updated 8 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆34Jun 16, 2022Updated 3 years ago
- GitHub Action安全工具,可以将Action Secrets还原拿到明文,用于证 明Secrets并不是绝对的安全。(测试通过,放心使用,再有问题来issues区锤我...)☆24Sep 12, 2022Updated 3 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- Simple static blog written in Go, packaged in one binary.☆22Oct 26, 2022Updated 3 years ago