jtesta / k8s_spoofilizerLinks
Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.
☆49Updated 9 months ago
Alternatives and similar repositories for k8s_spoofilizer
Users that are interested in k8s_spoofilizer are comparing it to the libraries listed below
Sorting:
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆135Updated 3 weeks ago
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆106Updated 3 months ago
- CaptainCredz is a modular and discreet password-spraying tool.☆132Updated 4 months ago
- Tools for attacking Azure Function Apps☆87Updated last month
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆75Updated 2 weeks ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆43Updated 3 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆150Updated 6 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆39Updated 2 months ago
- Putting a leash on naughty AWS permissions☆132Updated 3 months ago
- ☆82Updated 3 weeks ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- ☆120Updated 2 months ago
- ☆46Updated last year
- Artifact monitoring that ensures fairplay☆78Updated 10 months ago
- GCP-Hound - Google Cloud Security Attack Path Discovery Tool - v1.1.1☆66Updated last month
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Claude MCP server to perform analysis on ROADrecon data☆48Updated 8 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆60Updated 2 years ago
- Source Code Management Attack Toolkit☆135Updated 3 years ago
- Repo hacks☆21Updated 7 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆58Updated 2 years ago
- Cloud subdomains identification tool☆61Updated 7 months ago
- Linux CS bypass technique☆32Updated 10 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated last year
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆77Updated 8 months ago
- Addon for BHCE☆57Updated 8 months ago
- dauthi is a tool that takes advantage of API functionality across a variety of MDM solutions to perform user enumeration and single-facto…☆43Updated last year
- Your Skyfall Infrastructure Pack☆88Updated 3 weeks ago
- ☆40Updated 3 weeks ago
- ☆54Updated 10 months ago