Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env
☆102Sep 10, 2019Updated 6 years ago
Alternatives and similar repositories for kube-env-stealer
Users that are interested in kube-env-stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆39Aug 13, 2021Updated 4 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 6 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BPF examples for Kubernetes☆14May 25, 2019Updated 6 years ago
- Kubernetes security tool for policy enforcement☆440Jan 12, 2023Updated 3 years ago
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Jun 5, 2022Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆164Nov 28, 2025Updated 4 months ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- A CLI tool for temporarily escalating GCP IAM privileges to perform high privilege tasks.☆29Mar 15, 2023Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Feb 6, 2025Updated last year
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- ☆56Nov 29, 2017Updated 8 years ago
- A Cluster API Infrastructure Provider implementation using Kubernetes itself as the infrastructure☆34Apr 5, 2021Updated 5 years ago
- Test utility for cve-2018-1002105☆193Dec 13, 2018Updated 7 years ago
- This project demonstrates a different upgrade procedures best suited for clusters containing stateless and stateful workloads. You will p…☆53Dec 14, 2023Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Automatically sync groups into Kubernetes RBAC☆243Dec 18, 2023Updated 2 years ago
- ☆29Jan 31, 2025Updated last year
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆51May 19, 2020Updated 5 years ago
- An OpenFaaS Provider example using memory for state.☆24Aug 16, 2022Updated 3 years ago
- Small program to enable "Do not disturb" mode on OSX for X minutes☆15Oct 19, 2020Updated 5 years ago
- Drift detection and reporting for Terraform.☆27May 25, 2021Updated 4 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 8 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- ☆215Aug 26, 2016Updated 9 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆79Aug 30, 2019Updated 6 years ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆93Aug 15, 2024Updated last year
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- ☆279Mar 19, 2026Updated last month
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆397Sep 16, 2021Updated 4 years ago