danielsagi / kube-pod-escape
Kubernetes POC for utilizing write mount to /var/log for getting a root on the host
☆93Updated 4 years ago
Alternatives and similar repositories for kube-pod-escape:
Users that are interested in kube-pod-escape are comparing it to the libraries listed below
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆73Updated 9 months ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 2 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆77Updated 5 years ago
- This repository contain any information that can be used to hack Kubernetes☆100Updated 2 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆162Updated last year
- Kubolt utility for scanning public kubernetes clusters☆109Updated 8 months ago
- Links and resources for the O'Reilly Kubernetes Security book☆98Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- POC for CVE-2022-23648☆36Updated 2 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆39Updated 2 years ago
- A penetration toolkit for container environment☆77Updated last month
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆282Updated 3 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- Exploit for WebSocket Vulnerability in Apache Tomcat☆166Updated 4 years ago
- Tool for auditing RBACs in Kubernetes☆215Updated last year
- Detect and bypass Istio sidecar☆20Updated 3 years ago
- book website☆67Updated 3 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- Intentionally vulnerable Go web app.☆43Updated last month
- 🌶 一些和容器化/容器编排/服务网格等技术相关的安全代码片段[自用备份]☆80Updated 3 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated last year
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆104Updated 5 years ago
- PoC for CVE-2018-1002105.☆223Updated 6 years ago
- Kubernetes Security: from Image Hygiene to Network Policies☆143Updated 6 years ago
- DEF CON 26 Workshop - Attacking & Auditing Docker Containers Using Open Source☆107Updated 5 years ago