g3rzi / HackingKubernetesLinks
This repository contain any information that can be used to hack Kubernetes
☆110Updated 3 years ago
Alternatives and similar repositories for HackingKubernetes
Users that are interested in HackingKubernetes are comparing it to the libraries listed below
Sorting:
- Simple tool to decrypt Jenkins encrypted strings☆79Updated 2 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- Source Code Management Attack Toolkit☆222Updated 3 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 3 years ago
- ☆126Updated last year
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Cloud agnostic IAM permissions enumerator☆156Updated 5 months ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Updated last week
- Dockerized POC for CVE-2022-42889 Text4Shell☆77Updated 2 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆85Updated last year
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Updated 4 years ago
- A fingerprint generation helper for nuclei network templates☆74Updated 2 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆128Updated 2 years ago
- Find CVE PoCs on GitHub☆153Updated 2 months ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Kubernetes pentesting, hardening and hunting tools.☆71Updated 2 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆205Updated 3 years ago
- Improve automated and semi-automated active scanning in Burp Pro☆62Updated 4 months ago
- Command line tool for dumping Jenkins credentials.☆191Updated last year
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- jolokia-exploitation-toolkit☆297Updated 9 months ago
- A robust Red Team proxy written in Go.☆163Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- oauth-labs: an intentionally vulnerable set of OAuth 2.0 labs for security training and learning☆72Updated 10 months ago
- A utility to convert your AWS CLI credentials into AWS console access.☆244Updated 5 years ago