jtesta / k8s_spoofilizerLinks
Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.
☆49Updated 7 months ago
Alternatives and similar repositories for k8s_spoofilizer
Users that are interested in k8s_spoofilizer are comparing it to the libraries listed below
Sorting:
- JamfHound is a python3 project designed to collect and identify attack paths in Jamf Pro tenants based on existing object permissions by …☆93Updated last month
- A tool to help pentesters quickly identify privileged principals and second-order privilege escalation opportunities in unfamiliar AWS ac…☆46Updated 2 weeks ago
- GitHub Actions Cache Native Malware - for Educational and Research Purposes only.☆69Updated 3 weeks ago
- CaptainCredz is a modular and discreet password-spraying tool.☆131Updated 2 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆42Updated last month
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 4 months ago
- Tools for attacking Azure Function Apps☆83Updated 11 months ago
- Eve is a JAMF exploitation toolkit used to interact with locally hosted JAMF servers and those hosted on jamfcloud.com.☆34Updated 2 weeks ago
- Artifact monitoring that ensures fairplay☆78Updated 8 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Updated last year
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- Addon for BHCE☆55Updated 6 months ago
- Repo hacks☆21Updated 5 months ago
- ☆71Updated last month
- Linux CS bypass technique☆33Updated 8 months ago
- ☆46Updated last year
- Webshell agent in aspx and php☆24Updated 4 months ago
- Cloud subdomains identification tool☆60Updated 5 months ago
- ☆86Updated 2 months ago
- Putting a leash on naughty AWS permissions☆130Updated last month
- DelePwn is a security assessment tool designed to identify and demonstrate the risks associated with Google Workspace Domain-Wide Delegat…☆34Updated last month
- Determine privileges from cloud credentials via brute-force testing.☆69Updated last year
- Rebuild of portspoof in GO with additional features.☆19Updated 2 weeks ago
- 🌩️ Collection of BloodHound queries for Azure☆77Updated 8 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- Simple C2 using GitHub repository as comms channel.☆31Updated 11 months ago
- Your Skyfall Infrastructure Pack☆76Updated last month
- Proof of Concepts for malicious maintainers: How to Tamper with Releases built with GitHub Actions Worfklows, presented at fwd:cloudsec E…☆65Updated 2 weeks ago
- ☆115Updated 3 weeks ago
- tool for enumeration & bulk download of sensitive files found in SharePoint environments☆72Updated 6 months ago