Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.
☆44Feb 10, 2026Updated 3 weeks ago
Alternatives and similar repositories for keyctl-unmask
Users that are interested in keyctl-unmask are comparing it to the libraries listed below
Sorting:
- Ed is a tool used to identify and exploit accessible UNIX Domain Sockets☆27Mar 11, 2019Updated 6 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target container☆106Nov 30, 2018Updated 7 years ago
- ☆29Jan 31, 2025Updated last year
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- Container security resources☆10Nov 14, 2020Updated 5 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- ☆19Jan 31, 2025Updated last year
- ☆56Nov 29, 2017Updated 8 years ago
- (Unofficial) Ruby wrapper for the Bugcrowd HTTP API☆14Feb 27, 2017Updated 9 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 7 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- Exercises from The Book of C authored by Pragati Dhingra and Priyanka Bhaskar☆10Feb 25, 2023Updated 3 years ago
- Interrogate your GitHub resources with the help of the world's greatest detectives: Powerpipe + Steampipe + Sherlock.☆41Aug 14, 2025Updated 6 months ago
- ☆18Aug 4, 2020Updated 5 years ago
- Proof of Concept files for SensePost's blog - Painless intro to the linux userland heap☆22Aug 15, 2017Updated 8 years ago
- eBPF - extended Berkeley Packet Filter tooling☆134Jun 24, 2022Updated 3 years ago
- Méthode de Sensibilisation à la Sécurité Informatique pour un public Néophyte☆17Jun 17, 2015Updated 10 years ago
- RCE in NPM VSCode Extension☆20Apr 11, 2021Updated 4 years ago
- Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go☆18Jun 1, 2022Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- Binary Ninja Syscall Annotator☆46May 18, 2022Updated 3 years ago
- The Dirty Pipe Vulnerability☆46Mar 8, 2022Updated 3 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆675Sep 27, 2023Updated 2 years ago
- It records your terminal, then lets you upload to ASHIRT☆29Feb 27, 2026Updated last week
- a pstree mod that prints other helpful information and with added functionality☆25Sep 5, 2020Updated 5 years ago
- ☆23Sep 20, 2024Updated last year
- ☆29May 12, 2025Updated 9 months ago
- REbus facilitates the coupling of existing tools that perform specific tasks, where one's output will be used as the input of others.☆25Oct 8, 2020Updated 5 years ago
- Kubernetes Pwnage for all☆57Nov 14, 2020Updated 5 years ago
- Use SQL to instantly query host, DNS and exploit information using Shodan. Open source CLI. No DB required.☆29Updated this week
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- ☆30Jan 12, 2023Updated 3 years ago
- A set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard certificate in as simple a p…☆30Nov 30, 2025Updated 3 months ago
- ☆24Feb 12, 2016Updated 10 years ago