beserkerbob / KubernetesEnumerationToolLinks
A tool to help you to automate processes within kubernetes
☆18Updated 8 months ago
Alternatives and similar repositories for KubernetesEnumerationTool
Users that are interested in KubernetesEnumerationTool are comparing it to the libraries listed below
Sorting:
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆16Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆32Updated last year
- A tool for secrets management, encryption as a service, and privileged access management☆14Updated 3 months ago
- A simple web app to get the latest EPSS data for a CVE ID☆11Updated 7 months ago
- ☆31Updated 4 months ago
- ☆17Updated 6 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- ☆60Updated 2 years ago
- A GitHub Actions Supply Chain CTF / Goat☆25Updated last week
- ☆14Updated 4 months ago
- Scan your account for the use of untrusted AMIs☆30Updated 2 months ago
- urlyzer is a URL parsing analysis tool.☆24Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆49Updated 7 months ago
- Collection of Docker honeypot logs from 2021 - 2024☆36Updated last year
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆76Updated last month
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆74Updated last year
- ☆34Updated 4 years ago
- An open source Wireshark extcap to make ad hoc mirroring of AWS EC2 traffic easier☆19Updated 10 months ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 4 years ago
- This GitHub Action sends a reverse shell from a runner via Azure Storage Account blobs☆37Updated last year
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- ☆18Updated 3 years ago
- A not-curated list of cloud hacking labs☆27Updated last year
- ☆47Updated 11 months ago
- Tool for obfuscating and deobfuscating data.☆74Updated last year
- A repository of curated lists with elements such as IoCs to use for threat hunting & detection queries.☆34Updated last year
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆29Updated 7 months ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Permiso Security has created a tool to query snowflake environments for evidence of compromise, based on indicators from Permiso and the …☆72Updated last year