Kubernetes Pwnage for all
☆58Nov 14, 2020Updated 5 years ago
Alternatives and similar repositories for kubepwn
Users that are interested in kubepwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for auditing RBACs in Kubernetes☆224Feb 5, 2024Updated 2 years ago
- ☆29Jan 31, 2025Updated last year
- A curated list of Falco related tools, frameworks, blogs, podcasts, and articles☆202Jul 28, 2021Updated 4 years ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- A curated list of awesome Kubernetes security resources☆957Dec 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- GitHub Actions for MobSF☆26Apr 24, 2024Updated last year
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆478Nov 7, 2025Updated 4 months ago
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- Red Team Scripts for AWS.☆169Jul 28, 2020Updated 5 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated last month
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- EKS Logging Examples☆38Oct 26, 2023Updated 2 years ago
- ☆139Mar 29, 2023Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 8 months ago
- A curated list for Awesome Kubernetes Security resources☆1,994Mar 18, 2026Updated last week
- Identify privilege escalation paths within and across different clouds☆719Feb 6, 2026Updated last month
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆416Oct 6, 2025Updated 5 months ago
- A curated list of Istio related tools, frameworks and articles.☆145Dec 15, 2023Updated 2 years ago
- InfoSecIITR website☆11Nov 15, 2025Updated 4 months ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Duo MFA auditing tool to test users' likelihood of approving unexpected push notifications☆13Apr 20, 2018Updated 7 years ago
- Repository of exploits for research purposes☆15Jul 12, 2023Updated 2 years ago
- ☆108Nov 15, 2025Updated 4 months ago
- egrets monitors egress☆46Apr 12, 2020Updated 5 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Aug 9, 2022Updated 3 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆187Mar 2, 2026Updated 3 weeks ago
- Scan IPv4 prefixes for DNS revolvers and classify them as open/closed☆10Jun 19, 2014Updated 11 years ago
- ☆10Oct 25, 2020Updated 5 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Feb 6, 2025Updated last year
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago
- Joern Workshops☆32Jan 16, 2025Updated last year
- Reverse TCP Powershell has never been this paranoid. (basically an Opsec-safe reverse powershell)☆30Feb 4, 2022Updated 4 years ago