antitree / keyctl-unmaskView external linksLinks
Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.
☆44Feb 5, 2026Updated last week
Alternatives and similar repositories for keyctl-unmask
Users that are interested in keyctl-unmask are comparing it to the libraries listed below
Sorting:
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Mar 11, 2019Updated 6 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- ☆29Jan 31, 2025Updated last year
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 6 months ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- Toolset to analyse TLS datasets☆12Aug 7, 2019Updated 6 years ago
- ☆56Nov 29, 2017Updated 8 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 8 years ago
- Kubernetes Easter CTF☆59Jul 10, 2020Updated 5 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- Chosen-Prefix Collision Attack Against SHA-1 Hash Function☆17Feb 17, 2020Updated 5 years ago
- ☆18Aug 4, 2020Updated 5 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- eBPF - extended Berkeley Packet Filter tooling☆133Jun 24, 2022Updated 3 years ago
- Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go☆18Jun 1, 2022Updated 3 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- ☆18Aug 15, 2021Updated 4 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Jan 28, 2024Updated 2 years ago
- Opsec considerations for each AWS GuardDuty finding type.☆24Oct 29, 2020Updated 5 years ago
- Binary Ninja Syscall Annotator☆46May 18, 2022Updated 3 years ago
- The Dirty Pipe Vulnerability☆46Mar 8, 2022Updated 3 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆675Sep 27, 2023Updated 2 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Updated this week
- a pstree mod that prints other helpful information and with added functionality☆25Sep 5, 2020Updated 5 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Nov 18, 2020Updated 5 years ago
- ☆28May 12, 2025Updated 9 months ago
- ☆23Sep 20, 2024Updated last year
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Kubernetes Pwnage for all☆57Nov 14, 2020Updated 5 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 2 months ago
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Oct 14, 2024Updated last year
- ☆24Feb 12, 2016Updated 10 years ago
- Golang CTF framework and exploit development module☆28Aug 31, 2021Updated 4 years ago
- ☆31Jan 12, 2023Updated 3 years ago