Kubernetes Pwnage for all
☆59Nov 14, 2020Updated 5 years ago
Alternatives and similar repositories for kubepwn
Users that are interested in kubepwn are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tool for auditing RBACs in Kubernetes☆224Feb 5, 2024Updated 2 years ago
- ☆29Jan 31, 2025Updated last year
- ☆12Mar 31, 2021Updated 5 years ago
- Extra cmdlets to help with quering security related information from Azure☆15Sep 16, 2024Updated last year
- A curated list of awesome Kubernetes security resources☆960Dec 15, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- 近年来容器安全相关论文收集整理☆15May 26, 2023Updated 2 years ago
- Deliberately insecure Kubernetes test clusters built using kind☆13Aug 16, 2019Updated 6 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆480Nov 7, 2025Updated 5 months ago
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- yara-python-dex enabled wheels☆11Aug 31, 2025Updated 7 months ago
- Interactive IPython Notebook to demonstrate OWASP ZAP's API and Scripting Functions - OWASP ZAP 2.8.0☆41Dec 8, 2022Updated 3 years ago
- Red Team Scripts for AWS.☆169Jul 28, 2020Updated 5 years ago
- Create notes during a security code review in VSCode 📝 Import your favorite SAST tool findings 🛠️ and collaborate with others 🤝☆142Feb 26, 2026Updated last month
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 3 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- EKS Logging Examples☆38Oct 26, 2023Updated 2 years ago
- ☆140Mar 29, 2023Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- Automated (kinda) deployment of MalRDP infrastructure with Terraform & Ansible☆12Sep 15, 2023Updated 2 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 9 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆16Sep 6, 2017Updated 8 years ago
- A curated list for Awesome Kubernetes Security resources☆1,998Updated this week
- Test Azure environment for MFA misconfigurations☆12Jan 13, 2023Updated 3 years ago
- Identify privilege escalation paths within and across different clouds☆718Feb 6, 2026Updated 2 months ago
- NimSkrull is an adaption from the original Skrull malware anti-copy DRM. Only for the anti-copy feature. (https://github.com/aaaddress1/S…☆13May 20, 2023Updated 2 years ago
- This repository is used to analysis the shared resources of different containers☆30Oct 22, 2024Updated last year
- Minimum DevSecOps with Monitoring Options on Amazon EKS☆13Mar 27, 2026Updated 3 weeks ago
- A collection of GCP IAM privilege escalation methods documented by the Rhino Security Labs team.☆419Oct 6, 2025Updated 6 months ago
- ☆18Nov 24, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- OAuth 2.0 Dynamic Security Scanner☆33Feb 27, 2021Updated 5 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- A curated list of Istio related tools, frameworks and articles.☆145Dec 15, 2023Updated 2 years ago
- InfoSecIITR website☆11Nov 15, 2025Updated 5 months ago
- Perform operations on URLs like extracting paths, parameter names and/or values, domain name, host name (without HTTP[s]).☆29Aug 19, 2020Updated 5 years ago
- A proof of concept for delivering webbugs via AWS lambda☆46Sep 10, 2018Updated 7 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Dec 27, 2021Updated 4 years ago