Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
☆19May 6, 2024Updated 2 years ago
Alternatives and similar repositories for ExcessivePermissionAttack
Users that are interested in ExcessivePermissionAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Bugs in Pods: Understanding Bugs in Container Runtime Systems (ISSTA 2024)☆19Aug 4, 2024Updated last year
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- 《Redis 命令速查表》☆14Nov 6, 2017Updated 8 years ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- SGXCrypter☆15Jan 19, 2017Updated 9 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 6 years ago
- The official repository of the paper "The Digital Cybersecurity Expert: How Far Have We Come?" presented in IEEE S&P 2025☆24May 21, 2025Updated last year
- ☆18Feb 2, 2023Updated 3 years ago
- ☆12Sep 27, 2018Updated 7 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 10 months ago
- Artifact repository for the paper "A Large-scale Data Set and an Empirical Study of Docker Images Hosted on Docker Hub." This reproducibl…☆13Oct 9, 2020Updated 5 years ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆62Aug 7, 2024Updated last year
- ☆27Nov 16, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- ☆17Jul 25, 2024Updated last year
- Multi-class classification of Android malware based on CICAndMal2017 dataset: https://www.unb.ca/cic/datasets/andmal2017.html☆13Jan 20, 2020Updated 6 years ago
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated last year
- 大模型辅助SAST静态代码分析的Demo系统☆13Feb 19, 2025Updated last year
- docker学习,参考b战 遇见狂神说☆14Apr 1, 2022Updated 4 years ago
- 这是一款适用于Ubuntu(基于12.04)系统的操作系统测评软件,名为乐测评, 主要对系统进行如下六个方面的性能检测:CPU、内存、磁盘&IO、网络、开机速度、系统安全,软硬件方面都会进行较全面的检测。每个方面先检测操作系统基本信息,让用户对自己的系统有个基本了解。然后…☆17Mar 25, 2017Updated 9 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆24Apr 27, 2026Updated 3 weeks ago
- GEF - GDB Enhanced Features for exploit devs & reversers☆27Mar 9, 2024Updated 2 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- 基于 claude-agent-sdk 的智能渗透测试 Agent,用于参与第二届 TCH 智能渗透挑战赛。☆56May 11, 2026Updated last week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Use ICMP requests to check the alive subnet.☆23Jul 26, 2021Updated 4 years ago
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆17Apr 26, 2021Updated 5 years ago
- The container escape challenge of Be A RWCTFer competition (https://be-a-rwctfer.realworldctf.com/)☆61Mar 20, 2025Updated last year
- CVE-2022-3910☆12Mar 14, 2023Updated 3 years ago
- ☆22Mar 25, 2019Updated 7 years ago
- 通过RPC创建计划任务☆31May 18, 2025Updated last year
- Speaker-listener Label Propagation Algorithm Implemented in Python☆15Oct 31, 2013Updated 12 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ICSE 2020 Artifact for: Learning from, Understanding, and Supporting DevOps Artifacts for Docker☆24Dec 8, 2022Updated 3 years ago
- 这是一款现代、高性能的跨平台 C2 架构系统。采用 Rust 编写受控端,Go 编写服务端,以及 Vue 3 极致轻量化 UI。深度融合 MCP 协议,开启 AI 自动化攻防新篇章。☆82Feb 28, 2026Updated 2 months ago
- 精简版搜集工具☆15Sep 4, 2024Updated last year
- Linux kernel exploit☆13Oct 6, 2021Updated 4 years ago
- PoC: fully unprivileged container escape to node-level code execution on Kubernetes via CVE-2026-31431 page-cache corruption + shared ima…☆146May 7, 2026Updated 2 weeks ago
- vArmor is a cloud-native container hardening system that leverages AppArmor/BPF/Seccomp and network proxy technologies to enforce access …☆475Updated this week
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated 2 years ago