A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.
☆78Aug 30, 2019Updated 6 years ago
Alternatives and similar repositories for kube-dnsspoof
Users that are interested in kube-dnsspoof are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Nov 18, 2020Updated 5 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- python3 scripts to help with aws triage needs☆15Feb 11, 2022Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- MQTT Load Tester and Monitoring Tool☆12Aug 4, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- oracle 10g sys权限通过java执行命令获得一个非交互shell的客户端,通常用于正向连接☆39Jan 4, 2017Updated 9 years ago
- Check images in your charts for vulnerabilities☆43Nov 14, 2025Updated 6 months ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 4 years ago
- Expose SMI Metrics☆24May 25, 2021Updated 4 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆43Jul 22, 2020Updated 5 years ago
- Open-source components of CyberArk Certificate Manager for Kubernetes Discovery.☆261Updated this week
- a security controller for Kubernetes☆14Feb 8, 2019Updated 7 years ago
- ☆112Mar 29, 2026Updated last month
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- The public end and logs for a Kubernetes Goose Game.☆75Nov 20, 2020Updated 5 years ago
- Harness the security superpowers of your cloud asset inventory☆11Sep 22, 2024Updated last year
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Octant plugin for kind☆12Jan 19, 2023Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 5 years ago
- Funding requests for project infrastructure, events, and consulting.☆18Oct 2, 2023Updated 2 years ago
- A Python, Boto3 script that leverages a forensic volume to attach & mount to a selected instance, run a memory dump, unmount and detach f…☆12Jul 15, 2020Updated 5 years ago
- MacOS C2 Framework☆85Sep 2, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Phantom DLL Hollowing method implemented in modmap☆18Jun 9, 2021Updated 4 years ago
- Kubernetes Security Training Platform - focusing on security mitigation☆987Sep 2, 2024Updated last year
- A proof of concept for a clickjacking attack on macOS.☆98Feb 12, 2024Updated 2 years ago
- Full TTY reverse shell over SSH☆59Jul 14, 2020Updated 5 years ago
- Inject Falco and pdig into a running kubernetes pod☆13May 14, 2020Updated 6 years ago
- ☆15Oct 25, 2021Updated 4 years ago
- PoC for CVE-2018-1002105.☆222Dec 21, 2018Updated 7 years ago
- Build and deploy Node.js application on Kubernetes☆16Sep 17, 2025Updated 8 months ago
- IcosaSwitch is an All-In-One Switch Hacking applications☆17Sep 19, 2021Updated 4 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- A powerful hacker toolkit collected more than 10 categories of open source scanners from Github - 安全行业从业者自研开源扫描器合辑☆19Apr 19, 2024Updated 2 years ago
- A simple pam account module to process HBAC rules stored on an IPA server☆10May 14, 2018Updated 8 years ago
- This is a patched version of ExchangeRelayX☆14Aug 13, 2020Updated 5 years ago
- Windows10 & Windows Server 2016 LPE Exploit (use schedsvc!SchRpcSetSecurity())☆102Sep 28, 2018Updated 7 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- Get dependants of a module on npm.☆18Mar 2, 2023Updated 3 years ago
- ☆29Jan 31, 2025Updated last year