Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
☆19May 6, 2024Updated last year
Alternatives and similar repositories for ExcessivePermissionAttack
Users that are interested in ExcessivePermissionAttack are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- Securing System Logs With Intel SGX☆17Mar 31, 2017Updated 9 years ago
- ☆15May 26, 2021Updated 4 years ago
- a component of red teaming for generate route map.☆11Aug 30, 2024Updated last year
- Trusted I/O Paths for SGX Enclaves☆18Apr 30, 2020Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ☆18Feb 2, 2023Updated 3 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- 可爬取、更新并将 K8S 官方漏洞翻译(通过 DeepSeek)成简体中文☆17Jul 19, 2025Updated 9 months ago
- Page-Oriented Programming (POP) Tools for Black Hat USA 2023 and USENIX security 2024☆60Aug 7, 2024Updated last year
- 基于 claude-agent-sdk 的智能渗透测试 Agent,用于参与第二届 TCH 智能渗透挑战赛。☆46Apr 17, 2026Updated 2 weeks ago
- Using Android Malware Dataset (CICAndMal2017)☆11Jul 23, 2019Updated 6 years ago
- 云原生安全漏洞☆17Sep 9, 2025Updated 7 months ago
- ☆17Jul 25, 2024Updated last year
- CAShift: Benchmarking Log-Based Cloud Attack Detection under Normality Shift (FSE 2025)☆13May 19, 2025Updated 11 months ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- 大模型辅助SAST静态代码分析的Demo系统☆13Feb 19, 2025Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Code and data for the USENIX 2025 paper "We Have a Package for You! A Comprehensive Analysis of Package Hallucinations by Code Generating…☆28Aug 12, 2025Updated 8 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Use ICMP requests to check the alive subnet.☆23Jul 26, 2021Updated 4 years ago
- The container escape challenge of Be A RWCTFer competition (https://be-a-rwctfer.realworldctf.com/)☆61Mar 20, 2025Updated last year
- The repository is created in pursuit of detecting malware-based domain names that were generated using DGA.☆16Apr 26, 2021Updated 5 years ago
- Kubernetes 集群部署 - 一镜到底纯手工部署 K8S 学习集群工作原理☆15Jan 12, 2025Updated last year
- 通过RPC创建计划任务☆31May 18, 2025Updated 11 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- dataSet for kubAnomaly model☆20Mar 24, 2023Updated 3 years ago
- Speaker-listener Label Propagation Algorithm Implemented in Python☆15Oct 31, 2013Updated 12 years ago
- 这是一款现代、高性能的跨平台 C2 架构系统。采用 Rust 编写受控端,Go 编写服务端,以及 Vue 3 极致轻量化 UI。深度融合 MCP 协议,开启 AI 自动化攻防新篇章。☆76Feb 28, 2026Updated 2 months ago
- 非流量触发Ring 3后门/Non-traffic triggers Ring 3 backdoor☆22May 1, 2024Updated 2 years ago
- cdnAnalyzer已更名为cdninfo 完善的CDN信息分析工具 基于EDNS、ASN、CNAME、IPlocate等多个维度筛选☆40Apr 25, 2026Updated last week
- Code audit (code review) with VIM.☆17Jan 3, 2025Updated last year
- ☆26Apr 12, 2026Updated 2 weeks ago
- Bootstrap Kubernetes the hard way on self-hosted bare-metal (or VM) cluster -- forked and modified from Kelsey Hightower's tutorial☆15Feb 19, 2019Updated 7 years ago
- Source code of AsiaCCS'22 paper - RecIPE: Revisiting the Evaluation of Memory Error Defenses☆13Sep 19, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- An automated ROP generation work☆12Mar 5, 2025Updated last year
- Malicious domain name detection based on tensorflow☆36Jan 6, 2018Updated 8 years ago
- LLAP is an LLVM-based tool for generating enriched program dependency graphs (ePDGs) from program source code that are suitable for use i…☆16May 17, 2023Updated 2 years ago
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆35Jun 16, 2022Updated 3 years ago
- GitHub Action安全工具,可以将Action Secrets还原拿到明文,用于证明Secrets并不是绝对的安全。(测试通过,放心使用,再有问题来issues区锤我...)☆24Sep 12, 2022Updated 3 years ago
- Simple static blog written in Go, packaged in one binary.☆22Oct 26, 2022Updated 3 years ago
- 文章爬取Bot😎 爬取微信公众号,知乎,知乎专栏,简书,知否(SegmentFault),掘金,CSDN,V2EX,博客园文章转为 markdown☆23Apr 13, 2023Updated 3 years ago