cloudnative-security / hacking-kubernetes
☆43Updated 3 years ago
Alternatives and similar repositories for hacking-kubernetes:
Users that are interested in hacking-kubernetes are comparing it to the libraries listed below
- Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.☆118Updated this week
- Tool for auditing RBACs in Kubernetes☆215Updated last year
- ☆175Updated 3 months ago
- 🧰 Multi Tool Kubernetes Pentest Image☆222Updated 5 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆36Updated last month
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 3 weeks ago
- ☆237Updated 5 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆63Updated last year
- Blogpost series showcasing interesting cloud - web app security bugs☆47Updated last year
- Curating Falco rules with MITRE ATT&CK Matrix☆77Updated 11 months ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated last year
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆51Updated 2 years ago
- ☆92Updated 2 weeks ago
- Dredging up secrets from the depths of the file system☆120Updated 3 months ago
- GCPGoat : A Damn Vulnerable GCP Infrastructure☆367Updated 3 months ago
- Protect against subdomain takeover☆92Updated 8 months ago
- Tools and blogs I use to perform GCP red teams☆106Updated 6 months ago
- ☆93Updated 2 years ago
- truffleproc — hunt secrets in process memory (TruffleHog & gdb mashup)☆114Updated last year
- OWASP Foundation Web Respository☆43Updated 5 months ago
- ☆42Updated 8 months ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- A tool to keep AWS pentests and red teams efficient, organized, and stealthy.☆89Updated 11 months ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆448Updated 8 months ago
- Evaluate the RBAC permissions of Kubernetes identities through policies written in Rego☆343Updated last year
- This repository contain any information that can be used to hack Kubernetes☆100Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 4 years ago
- A simple script which implements different Cognito attacks such as Account Oracle or Priviledge Escalation☆102Updated last year
- The AWS Enumerator was created for service enumeration and info dumping for investigations of penetration testers during Black-Box testin…☆197Updated 2 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆267Updated last year