A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.
☆79Aug 30, 2019Updated 6 years ago
Alternatives and similar repositories for kube-dnsspoof
Users that are interested in kube-dnsspoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Nov 18, 2020Updated 5 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- Jupyter demo repository for PancakesCon2020☆16Mar 23, 2020Updated 6 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- MQTT Load Tester and Monitoring Tool☆12Aug 4, 2023Updated 2 years ago
- oracle 10g sys权限通过java执行命令获得一个非交互shell的客户端,通常用于正向连接☆39Jan 4, 2017Updated 9 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- Expose SMI Metrics☆24May 25, 2021Updated 4 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆43Jul 22, 2020Updated 5 years ago
- Open-source components of CyberArk Certificate Manager for Kubernetes Discovery.☆261Apr 23, 2026Updated last week
- ☆111Mar 29, 2026Updated last month
- The public end and logs for a Kubernetes Goose Game.☆75Nov 20, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A bare metal provider for the Kubernetes Cluster API☆13Dec 1, 2019Updated 6 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Funding requests for project infrastructure, events, and consulting.☆18Oct 2, 2023Updated 2 years ago
- OpenCSPM Community Controls☆14May 18, 2021Updated 4 years ago
- Mount all projects in a company's GitLab instance as a file system.☆16Dec 8, 2022Updated 3 years ago
- Proof of concept agentic solver for nfuncs from DEF CON Quals 2025☆23Apr 18, 2025Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- MKIT is a Managed Kubernetes Inspection Tool that validates several common security-related configuration settings of managed Kubernetes …☆397Sep 16, 2021Updated 4 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆986Sep 2, 2024Updated last year
- A proof of concept for a clickjacking attack on macOS.☆98Feb 12, 2024Updated 2 years ago
- The CustomResourceDefinition toolbox.☆27Jan 5, 2023Updated 3 years ago
- ☆15Oct 25, 2021Updated 4 years ago
- PoC for CVE-2018-1002105.☆222Dec 21, 2018Updated 7 years ago
- Build and deploy Node.js application on Kubernetes☆16Sep 17, 2025Updated 7 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- implementation of some concepts in Security and Exploiting☆13Aug 24, 2015Updated 10 years ago
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆19Apr 19, 2024Updated 2 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆103Sep 28, 2018Updated 7 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Go client and SDK for Falco☆55Mar 18, 2026Updated last month
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago