Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.
☆52Mar 3, 2025Updated last year
Alternatives and similar repositories for k8s_spoofilizer
Users that are interested in k8s_spoofilizer are comparing it to the libraries listed below
Sorting:
- ☆16Dec 7, 2025Updated 2 months ago
- A tool for secrets management, encryption as a service, and privileged access management☆13Jul 17, 2025Updated 7 months ago
- ☆14Mar 19, 2024Updated last year
- string encryption in Nim☆20Jun 15, 2024Updated last year
- Decrypt encrypted SonicOSX firmware images☆20Feb 24, 2025Updated last year
- Abuse Zabbix API to obtain Remote Command Execution on hosts☆18Jun 4, 2021Updated 4 years ago
- ☆94Jan 16, 2025Updated last year
- ☆40Oct 8, 2024Updated last year
- Repo hacks☆21Dec 7, 2025Updated 2 months ago
- ☆234Oct 8, 2024Updated last year
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year
- ☆12Jun 26, 2023Updated 2 years ago
- Command Augmentation support for BOFs and .NET assemblies across agents☆40Feb 17, 2026Updated 2 weeks ago
- Terms of Use Conditional Access M365 Evilginx Phishlet☆44Jun 23, 2025Updated 8 months ago
- Leveraging AWS Lambda Function URLs for C2 Redirection☆45Aug 30, 2023Updated 2 years ago
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- Using Just In Time (JIT) instruction decryption, this shellcode loader ensures that only the currently executing instruction is visible i…☆64Apr 2, 2025Updated 11 months ago
- RansomWhen is a tool to enumerate identities that can lock S3 Buckets using KMS, resulting in ransomwares, as well as detect occurances o…☆61Feb 5, 2025Updated last year
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆60Feb 25, 2026Updated last week
- YES3 Scanner: S3 Security Scanner for Access and Ransomware Protection☆102Jan 6, 2026Updated 2 months ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- A C# implementation that disables Windows Firewall bypassing UAC☆17Oct 23, 2024Updated last year
- A React Based Kubernetes YAML Manifest Sanity Checker☆11Mar 3, 2025Updated last year
- ☆12Mar 31, 2021Updated 4 years ago
- Threat Modeling with ATT&CK defines how to integreate MITRE ATT&CK® into your organization’s existing threat modeling methodology.☆12May 28, 2025Updated 9 months ago
- Sysmon Tools for PowerShell☆12Aug 17, 2018Updated 7 years ago
- A BloodHound collector for Microsoft Configuration Manager☆391Jul 7, 2025Updated 7 months ago
- Flexible LDAP proxy that can be used to inspect & transform all LDAP packets generated by other tools on the fly.☆191Feb 16, 2026Updated 2 weeks ago
- Parses cached certificate templates from a Windows Registry file and displays them in the same style as Certipy does☆95Jul 3, 2025Updated 8 months ago
- ☆17Jan 9, 2025Updated last year
- DorkTerm is a terminal-themed web-based security tool designed to assist security researchers in performing Google Dork queries efficient…☆16Jan 25, 2026Updated last month
- A dotnet executable to get an Entra token in an authenticated runtime☆17Oct 30, 2024Updated last year
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Pentester-focused Docker registry tool to enumerate and pull images☆36Oct 19, 2025Updated 4 months ago
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆38Aug 8, 2025Updated 6 months ago
- Logging tool intended for red team usage☆35Dec 5, 2025Updated 3 months ago
- ☆41Feb 20, 2025Updated last year
- CVE-2021-21975 vRealize Operations Manager SSRF☆13Mar 31, 2021Updated 4 years ago
- ☆31Dec 5, 2024Updated last year