g3rzi / HackingKubernetesLinks
This repository contain any information that can be used to hack Kubernetes
☆110Updated 3 years ago
Alternatives and similar repositories for HackingKubernetes
Users that are interested in HackingKubernetes are comparing it to the libraries listed below
Sorting:
- Source Code Management Attack Toolkit☆223Updated 3 years ago
- Simple tool to decrypt Jenkins encrypted strings☆79Updated 2 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 3 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 2 years ago
- ☆126Updated last year
- Cloud agnostic IAM permissions enumerator☆156Updated 6 months ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Updated last month
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆128Updated 2 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Updated 4 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆205Updated 3 years ago
- This is a dockerized application that is vulnerable to the Spring4Shell vulnerability (CVE-2022-22965).☆107Updated 3 years ago
- Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)☆233Updated 4 years ago
- Find CVE PoCs on GitHub☆153Updated 2 months ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- A fingerprint generation helper for nuclei network templates☆74Updated 2 years ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆174Updated last year
- Web CTF CheatSheet 🐈☆34Updated 6 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- A robust Red Team proxy written in Go.☆164Updated 3 years ago
- Proof of Concept for the Apache commons-text vulnerability CVE-2022-42889.☆34Updated 3 years ago
- Utility for creating ZipSlip archives☆79Updated 2 years ago
- jolokia-exploitation-toolkit☆298Updated 10 months ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆86Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆70Updated 4 years ago
- ☆570Updated 3 months ago