averonesis / kuboltLinks
Kubolt utility for scanning public kubernetes clusters
☆110Updated 3 months ago
Alternatives and similar repositories for kubolt
Users that are interested in kubolt are comparing it to the libraries listed below
Sorting:
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 6 years ago
- PoC for CVE-2018-1002105.☆223Updated 6 years ago
- A security testing Slackbot built with a Kubernetes backend on the Google Cloud Platform☆165Updated last year
- ☆50Updated 6 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆161Updated last year
- A tool for automatically gathering sensitive information from exposed Jenkins servers☆104Updated 2 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆108Updated 5 years ago
- Finding exposed secrets and personal data in GitLab☆200Updated 10 months ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- Kubernetes Easter CTF☆59Updated 5 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- ☆27Updated last month
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆65Updated 3 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 6 years ago
- ☆25Updated 4 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆98Updated 4 years ago
- Ruby command-line interface to Burp Suite's REST API☆58Updated 5 years ago
- Monitoring for leaks of sensitive information in git repositories☆43Updated last year
- ☆27Updated 5 years ago
- CVE-2017-9506 - SSRF☆190Updated 3 years ago
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- A lab to play with authentication and authorisation problems☆96Updated 2 years ago
- Python automation of Docker.sock abuse☆212Updated 2 years ago
- Elasticsearch for Offensive Security☆141Updated 5 years ago
- Burp with Friends☆103Updated 2 years ago
- Burp as a Docker Container☆59Updated 5 years ago
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆81Updated 6 years ago
- JWT Attack to change the algorithm RS256 to HS256☆34Updated 2 years ago