darryk10 / CVE-2021-25735
Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass
☆18Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for CVE-2021-25735
- Tools for auditing WAFS☆18Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆54Updated 6 months ago
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆49Updated 2 years ago
- ☆25Updated 3 years ago
- mesh-kridik is an open-source security checker that performs various security checks on a Kubernetes cluster with istio service mesh and …☆26Updated last month
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆18Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆13Updated 2 years ago
- Tool to automate takeover of DigitalOcean Kubernetes cluster. Check out the blog post for more info.☆15Updated 5 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 2 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 3 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆25Updated 2 years ago
- Some helpful Helm Charts for pentesters☆38Updated 5 years ago
- Exploit for win10 SMB3.1☆16Updated 4 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆12Updated 3 years ago
- Tool for reconnaissance of AWS cloud environments☆13Updated last year
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- Exactly what it sounds like, which is something rad☆20Updated 2 years ago
- Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts☆26Updated 4 years ago
- ☆31Updated last year
- mud-visualizer is a tool to visualize MUD files☆9Updated 2 years ago
- ☆14Updated last year
- OWASP ZAP add-on to detect reflected parameter vulnerabilities efficiently☆12Updated 3 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 7 years ago
- Kubernetes Unhinged Shell 😎☆45Updated 2 years ago