Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.
☆52Mar 3, 2025Updated last year
Alternatives and similar repositories for k8s_spoofilizer
Users that are interested in k8s_spoofilizer are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Dec 7, 2025Updated 4 months ago
- ☆14Mar 19, 2024Updated 2 years ago
- A tool for secrets management, encryption as a service, and privileged access management☆12Jul 17, 2025Updated 9 months ago
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- ☆42Oct 8, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- self-hosted Azure OSINT tool☆35Jun 24, 2025Updated 9 months ago
- ☆235Oct 8, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Repo hacks☆21Dec 7, 2025Updated 4 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆83May 27, 2025Updated 10 months ago
- Decrypt encrypted SonicOSX firmware images☆19Feb 24, 2025Updated last year
- Easily create index of your SANS books☆18Oct 28, 2022Updated 3 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆95Apr 7, 2026Updated last week
- Leveraging AWS Lambda Function URLs for C2 Redirection☆46Aug 30, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆42Mar 17, 2026Updated 3 weeks ago
- ☆12Mar 31, 2021Updated 5 years ago
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- Generate and Manage KeyCredentialLinks☆254Mar 9, 2026Updated last month
- string encryption in Nim☆19Jun 15, 2024Updated last year
- A BloodHound collector for Microsoft Configuration Manager☆396Jul 7, 2025Updated 9 months ago
- LibWinHttp is a simplified WinHTTP wrapper designed as a Crystal Palace shared library for implant development. Its primary purpose is to…☆40Nov 4, 2025Updated 5 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- ☆18Jun 10, 2025Updated 10 months ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆13May 28, 2025Updated 10 months ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- ☆200Mar 28, 2025Updated last year
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 9 months ago
- IP address filter by City☆12Jan 17, 2025Updated last year
- Terms of Use Conditional Access M365 Evilginx Phishlet☆45Jun 23, 2025Updated 9 months ago
- ☆125Jun 17, 2025Updated 10 months ago
- ForsHops☆59Mar 25, 2025Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆47Jul 29, 2024Updated last year
- An x64 position-independent shellcode stager that verifies the stage it retrieves prior to execution☆195Nov 27, 2024Updated last year
- Automated Cloud Misconfiguration Testing☆25Jun 20, 2025Updated 9 months ago
- Python implementation of GhostPack's Seatbelt situational awareness tool☆271Nov 12, 2024Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated last year
- ☆13Jun 26, 2023Updated 2 years ago
- ☆17Jan 9, 2025Updated last year