Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env
☆102Sep 10, 2019Updated 6 years ago
Alternatives and similar repositories for kube-env-stealer
Users that are interested in kube-env-stealer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆39Aug 13, 2021Updated 4 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 6 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- Kubernetes Auto Analyzer☆191Dec 11, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- BPF examples for Kubernetes☆14May 25, 2019Updated 6 years ago
- Kubernetes security tool for policy enforcement☆441Jan 12, 2023Updated 3 years ago
- Automation associated with our talk: Attacking and Defending Infrastructure with Terraform☆16Jun 5, 2022Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆164Nov 28, 2025Updated 4 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- A CLI tool for temporarily escalating GCP IAM privileges to perform high privilege tasks.☆29Mar 15, 2023Updated 3 years ago
- Assess certain AWS network configurations☆12Aug 22, 2018Updated 7 years ago
- These are tools we released with our 2020 defcon/blackhat talk https://www.youtube.com/watch?v=Ml09R38jpok☆173Feb 6, 2025Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- ☆56Nov 29, 2017Updated 8 years ago
- A Cluster API Infrastructure Provider implementation using Kubernetes itself as the infrastructure☆34Apr 5, 2021Updated 4 years ago
- Test utility for cve-2018-1002105☆193Dec 13, 2018Updated 7 years ago
- This project demonstrates a different upgrade procedures best suited for clusters containing stateless and stateful workloads. You will p…☆53Dec 14, 2023Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Automatically sync groups into Kubernetes RBAC☆243Dec 18, 2023Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆29Jan 31, 2025Updated last year
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- ☆51May 19, 2020Updated 5 years ago
- An OpenFaaS Provider example using memory for state.☆23Aug 16, 2022Updated 3 years ago
- Drift detection and reporting for Terraform.☆27May 25, 2021Updated 4 years ago
- Small program to enable "Do not disturb" mode on OSX for X minutes☆15Oct 19, 2020Updated 5 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago
- Writeup of CVE-2017-1002101 with sample "exploit"/escape☆35Mar 23, 2018Updated 8 years ago
- Enable Falco to read audit logs from EKS☆11Dec 13, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Exports primitive and predefined GCP IAM Roles and their permissions☆109Updated this week
- ☆215Aug 26, 2016Updated 9 years ago
- The command-line client for Journal☆12Oct 26, 2024Updated last year
- Proof-of-Concept python script that implements DNS spoofing attack in Kubernetes environment from a pod located on a Worker server☆15Feb 4, 2021Updated 5 years ago
- Research on the enumeration of IAM permissions without logging to CloudTrail☆60Jun 11, 2021Updated 4 years ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆71Aug 19, 2024Updated last year
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago