darryk10 / CVE-2021-25735Links
Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass
☆17Updated 4 years ago
Alternatives and similar repositories for CVE-2021-25735
Users that are interested in CVE-2021-25735 are comparing it to the libraries listed below
Sorting:
- Tools for auditing WAFS☆19Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated 6 months ago
- Reconnaissance test in Kubernetes clusters☆21Updated 6 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- ☆25Updated 4 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 3 years ago
- ☆27Updated last month
- Register your Kubernetes IPs to monitor.shodan.io☆18Updated 2 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆20Updated 4 years ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.org☆11Updated 3 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆16Updated 6 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 8 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In …☆19Updated 4 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 4 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- A 'find' for S3 public buckets☆11Updated 8 years ago
- A gitbook for doing a null Bangalore session on linux container security to discuss and teach namespaces, cgroups etc.☆20Updated 8 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆56Updated 6 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- A wrapper around jq, to help you parse jq output!☆30Updated 4 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆12Updated 3 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- Redis Security Map - Anti-hacking for Redis☆31Updated 3 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Updated 2 years ago
- notorious BIG IP☆15Updated 5 years ago