bgeesaman / kube-env-stealerView external linksLinks
Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env
☆102Sep 10, 2019Updated 6 years ago
Alternatives and similar repositories for kube-env-stealer
Users that are interested in kube-env-stealer are comparing it to the libraries listed below
Sorting:
- ☆28Aug 6, 2020Updated 5 years ago
- ☆39Aug 13, 2021Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- Kubernetes security tool for policy enforcement☆442Jan 12, 2023Updated 3 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆163Nov 28, 2025Updated 2 months ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- ☆215Aug 26, 2016Updated 9 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆172Feb 6, 2025Updated last year
- BPF examples for Kubernetes☆14May 25, 2019Updated 6 years ago
- ☆51May 19, 2020Updated 5 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Drift detection and reporting for Terraform.☆27May 25, 2021Updated 4 years ago
- Test utility for cve-2018-1002105☆195Dec 13, 2018Updated 7 years ago
- ☆18Jul 30, 2024Updated last year
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆675Sep 27, 2023Updated 2 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated 11 months ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- ☆29Jan 31, 2025Updated last year
- ☆27Oct 1, 2025Updated 4 months ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆71Aug 19, 2024Updated last year
- Small program to enable "Do not disturb" mode on OSX for X minutes☆15Oct 19, 2020Updated 5 years ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated 11 months ago
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Jun 5, 2022Updated 3 years ago
- Exports primitive and predefined GCP IAM Roles and their permissions☆110Feb 8, 2026Updated last week
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆94Aug 15, 2024Updated last year
- ☆271Jan 14, 2026Updated last month
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆398Sep 16, 2021Updated 4 years ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆350Mar 21, 2025Updated 10 months ago