Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env
☆102Sep 10, 2019Updated 6 years ago
Alternatives and similar repositories for kube-env-stealer
Users that are interested in kube-env-stealer are comparing it to the libraries listed below
Sorting:
- ☆28Aug 6, 2020Updated 5 years ago
- ☆39Aug 13, 2021Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- Kubernetes security tool for policy enforcement☆441Jan 12, 2023Updated 3 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆164Nov 28, 2025Updated 3 months ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Kantega Web Application Security Hero Challenge☆19Dec 3, 2020Updated 5 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- ☆215Aug 26, 2016Updated 9 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Feb 6, 2025Updated last year
- BPF examples for Kubernetes☆14May 25, 2019Updated 6 years ago
- ☆51May 19, 2020Updated 5 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- ☆56Nov 29, 2017Updated 8 years ago
- Drift detection and reporting for Terraform.☆27May 25, 2021Updated 4 years ago
- Salesforce Policy Deviation Checker☆30Sep 30, 2020Updated 5 years ago
- Test utility for cve-2018-1002105☆195Dec 13, 2018Updated 7 years ago
- ☆18Jul 30, 2024Updated last year
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆675Sep 27, 2023Updated 2 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- Burp Extension for AWS Signing☆90Jan 10, 2025Updated last year
- Repository to archive GCP Documentation for local use☆16Feb 11, 2025Updated last year
- A tool for analyzing the attack surface of an application☆19Mar 5, 2025Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- ☆29Jan 31, 2025Updated last year
- ☆27Feb 19, 2026Updated 2 weeks ago
- Utility for downloading and mounting EBS snapshots using the EBS Direct API's☆91Mar 17, 2025Updated 11 months ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆71Aug 19, 2024Updated last year
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Jun 5, 2022Updated 3 years ago
- Small program to enable "Do not disturb" mode on OSX for X minutes☆15Oct 19, 2020Updated 5 years ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆93Aug 15, 2024Updated last year
- ☆272Updated this week
- Exports primitive and predefined GCP IAM Roles and their permissions☆109Mar 2, 2026Updated last week
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆397Sep 16, 2021Updated 4 years ago