champtar / blogLinks
☆18Updated 3 years ago
Alternatives and similar repositories for blog
Users that are interested in blog are comparing it to the libraries listed below
Sorting:
- ✨🔐 CNCF Fuzzers☆127Updated last week
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- Linux Kernel Runtime Integrity with eBPF☆183Updated 2 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆99Updated 5 years ago
- ebpfkit-monitor is a tool that detects and protects against eBPF powered rootkits☆138Updated 2 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 6 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆162Updated last week
- bpflock - eBPF driven security for locking and auditing Linux machines☆150Updated 3 years ago
- A beginner-friendly CTF about Kubernetes security.☆80Updated 3 years ago
- Leaky Vessels Dynamic Detector☆103Updated 7 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆471Updated last month
- A penetration toolkit for container environment☆118Updated this week
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆88Updated last year
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 5 years ago
- ☆44Updated 6 months ago
- Kubernetes offensive framework built in eBPF☆39Updated 2 years ago
- Use eBPF to inject chaos into local processes☆66Updated last year
- Open API spec definition for the scanners that can be plugged into Harbor to do artifact scanning.☆26Updated last year
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 5 years ago
- ☆188Updated last week
- A set of commonly-used static binaries☆201Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆88Updated last year
- A process level network security monitoring and enforcement project for Kubernetes, using eBPF☆44Updated 5 years ago
- Generate a variety of suspect actions that are detected by Falco rulesets☆113Updated 6 months ago
- book website☆72Updated 3 years ago
- ☆310Updated 2 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Updated 2 years ago
- CVE-2022-0185☆376Updated 3 years ago
- PoC and Detection for CVE-2024-21626☆75Updated last year
- ☆89Updated last week