jtesta / k8s_spoofilizerLinks
Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.
☆51Updated 11 months ago
Alternatives and similar repositories for k8s_spoofilizer
Users that are interested in k8s_spoofilizer are comparing it to the libraries listed below
Sorting:
- CaptainCredz is a modular and discreet password-spraying tool.☆133Updated 6 months ago
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆142Updated 2 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Updated 8 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆52Updated 6 months ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆117Updated 5 months ago
- Cloud subdomains identification tool☆62Updated 9 months ago
- ☆92Updated this week
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Putting a leash on naughty AWS permissions☆134Updated 5 months ago
- Tools for attacking Azure Function Apps☆88Updated 3 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆41Updated 4 months ago
- ☆51Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆37Updated 6 months ago
- Repo hacks☆21Updated 2 months ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆88Updated 2 weeks ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year
- Hijack a slack bot to phish your way in☆57Updated 6 months ago
- Artifact monitoring that ensures fairplay☆79Updated last year
- Addon for BHCE☆58Updated 10 months ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- ☆104Updated 2 months ago
- ☆54Updated last year
- ☆42Updated 2 months ago
- gubble is a tool designed to audit Google Workspace group settings. It analyzes settings such as who can join, view membership, post mess…☆81Updated 8 months ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆79Updated 10 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆68Updated 4 months ago
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆165Updated last year
- Source Code Management Attack Toolkit☆134Updated 3 years ago
- Kooky cURL-powered replacement for reverse shell via /dev/tcp☆77Updated 2 weeks ago