XDU-SysSec / ExcessivePermissionAttackLinks
Take Over the Whole Cluster: Attacking Kubernetes via Excessive Permissions of Third-party Applications
☆16Updated last year
Alternatives and similar repositories for ExcessivePermissionAttack
Users that are interested in ExcessivePermissionAttack are comparing it to the libraries listed below
Sorting:
- Cloud Native Security News☆64Updated 5 months ago
- A penetration toolkit for container environment☆79Updated last week
- Auto-generated CodeQL rules for matching CVE vulnerabilities and variants.☆171Updated 8 months ago
- KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities (Best Practical Paper Award of RAID 2024)☆62Updated 4 months ago
- ☆17Updated last year
- ☆129Updated 3 weeks ago
- ☆26Updated last year
- ☆168Updated 2 years ago
- 容器安全漏洞的分析与复现☆158Updated last year
- CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸☆33Updated 2 years ago
- 静态分析笔记 Static-Analysis-Notes 程序分析笔记 资源分享☆182Updated 2 years ago
- ☆38Updated 2 years ago
- ☆25Updated 2 years ago
- Container (Docker) escape exploits☆51Updated 3 years ago
- collections of container escape techniques 🐿☆69Updated 4 years ago
- A grey-box web application Fuzzer☆23Updated 9 months ago
- Low-level RASP: Protecting Applications Implemented in High-level Programming Languages☆59Updated last year
- Atropos: Effective Fuzzing of Web Applications for Server-Side Vulnerabilities☆68Updated 9 months ago
- 一个搜索网络安全领域顶会论文的小工具☆86Updated 7 months ago
- Effective ReDoS Detection by Principled Vulnerability Modeling and Exploit Generation☆13Updated last week
- ☆49Updated 2 months ago
- 《深入理解Semgrep》Finding vulnerabilities with Semgrep.☆49Updated last year
- A declarative static analysis tool for jvm bytecode based Datalog like CodeQL☆335Updated last year
- Taint analysis implementation based on Heros and Soot☆45Updated last year
- Corax for Java: A general static analysis framework for java code checking.☆250Updated 6 months ago
- ☆67Updated 2 years ago
- ☆13Updated 3 weeks ago
- awesome resources about cloud native security 🐿☆317Updated last year
- Detecting Flow of Sensitive Data in Mini-Programs with Static Taint Analysis☆75Updated last year
- ☆38Updated 3 years ago