g3rzi / HackingKubernetesLinks
This repository contain any information that can be used to hack Kubernetes
☆109Updated 3 years ago
Alternatives and similar repositories for HackingKubernetes
Users that are interested in HackingKubernetes are comparing it to the libraries listed below
Sorting:
- ☆126Updated last year
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- Simple tool to decrypt Jenkins encrypted strings☆79Updated 2 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 3 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆114Updated 6 years ago
- CVE-2021-40346 PoC (HAProxy HTTP Smuggling)☆41Updated 4 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆137Updated last week
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- Repository of CVE found by OCD people☆83Updated 5 months ago
- Burp Suite Extension useful to verify OAUTHv2 and OpenID security☆174Updated last year
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Cloud agnostic IAM permissions enumerator☆160Updated 8 months ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Workshop on Template Injection (6 exercises) covering Twig, Jinja2, Tornado, Velocity and Freemaker engines.☆129Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆99Updated 5 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- A robust Red Team proxy written in Go.☆165Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆78Updated 3 years ago
- Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.☆112Updated 4 years ago
- Find CVE PoCs on GitHub☆156Updated 4 months ago
- ☆571Updated 4 months ago
- ☆106Updated 2 years ago
- Shell Simulation over Net-SNMP with extend functionality☆98Updated 4 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆206Updated 3 years ago
- This exention enables autocompletion within BurpSuite Repeater/Intruder tabs.☆164Updated 4 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago