averonesis / kubolt
Kubolt utility for scanning public kubernetes clusters
☆109Updated 10 months ago
Alternatives and similar repositories for kubolt:
Users that are interested in kubolt are comparing it to the libraries listed below
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- ☆27Updated 5 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆77Updated 5 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Kubernetes Easter CTF☆58Updated 4 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆166Updated 7 months ago
- PoC for CVE-2018-1002105.☆223Updated 6 years ago
- A security monitoring solution for Kubernetes☆132Updated last year
- Dockerfile Security Checker using OPA Rego policies with Conftest☆60Updated 2 years ago
- ☆48Updated 5 years ago
- A beginner-friendly CTF about Kubernetes security.☆77Updated 2 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- CVE-2017-9506 - SSRF☆188Updated 3 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆103Updated 5 years ago
- Ruby command-line interface to Burp Suite's REST API☆59Updated 5 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- Kubernetes Security: from Image Hygiene to Network Policies☆143Updated 6 years ago
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆103Updated 2 years ago
- ☆27Updated 5 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Updated 7 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆76Updated 5 years ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- ☆70Updated 7 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- Burp as a Docker Container☆59Updated 4 years ago
- ☆49Updated 4 years ago