CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)
☆25Jun 11, 2020Updated 5 years ago
Alternatives and similar repositories for CVE-2020-10749
Users that are interested in CVE-2020-10749 are comparing it to the libraries listed below
Sorting:
- Docker image: DNS over HTTPS proxy☆11Jun 26, 2020Updated 5 years ago
- Kubernetes Security Testing Guide☆26Apr 22, 2024Updated last year
- TelerikUI Vulnerability Scanner (CVE-2019-18935)☆12May 10, 2023Updated 2 years ago
- Invite users to a GitHub team in bulk☆12Jan 22, 2022Updated 4 years ago
- POC code for checking for this vulnerability. Since the code has been released, I decided to release this one as well. Patch Immediately!☆12Jul 5, 2020Updated 5 years ago
- Check for certs affected by July 2020 OCSP intermediate incident☆13Jul 15, 2020Updated 5 years ago
- A collection of simple to use renderers for ImGui.☆15Mar 25, 2016Updated 9 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- ☆11Jan 2, 2022Updated 4 years ago
- ☆43Sep 18, 2020Updated 5 years ago
- a new cfi mechanism☆33Sep 23, 2021Updated 4 years ago
- A hobby project of a C++ game engine. Uses OpenGL and C++20☆15Feb 11, 2026Updated last month
- CVE-2020-1958 PoC☆22Apr 11, 2020Updated 5 years ago
- Exploit PoC for CVE-2022-29968 by Joseph Ravichandran and Michael Wang☆20Aug 9, 2022Updated 3 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Jul 22, 2020Updated 5 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- ☆27Mar 16, 2023Updated 2 years ago
- Compares the TLS configuration of a web server to the Mozilla TLS Profiles☆26Nov 19, 2023Updated 2 years ago
- The GRUB2 signing extension are some scripts which help you to verify, sign and unsign your GRUB2 bootloader files using GPG.☆23Jul 22, 2021Updated 4 years ago
- Historical pre-merge OpenWrt archive☆24Jan 31, 2018Updated 8 years ago
- ☆26Jul 2, 2020Updated 5 years ago
- Here's the slides and audio for a talk I did at NYU on the 13th of November 2018☆28Nov 14, 2018Updated 7 years ago
- Deterministic/nonce-reuse resistant authenticated encryption scheme using XChaCha20, implemented on libsodium.☆30Aug 5, 2024Updated last year
- ☆22Sep 18, 2020Updated 5 years ago
- ☆26Dec 17, 2021Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Nov 19, 2024Updated last year
- Android user space components for the Trustonic Trusted Execution Environment☆39Sep 29, 2015Updated 10 years ago
- SyzBridge is a research project that adapts Linux upstream PoCs to downstream distributions. It provides rich interfaces that allow you t…☆39Nov 26, 2024Updated last year
- Be API implementation for Linux kernel and Android binder☆11Sep 19, 2023Updated 2 years ago
- ☆10Oct 9, 2024Updated last year
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 5 months ago
- Sukoshi is a proof-of-concept Python/C++ implant that leverages the MQTT protocol for C2 and uses AWS IoT Core as infrastructure.☆47Mar 26, 2022Updated 3 years ago
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- ☆12Oct 15, 2016Updated 9 years ago
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- File monitor for wafer maps, tester files, or about anything.☆13Aug 15, 2018Updated 7 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- This project is no longer maintained here, instead please see 'Untamed Now Playing Next', maintained by Wykks☆26May 9, 2014Updated 11 years ago
- A dark colourblind-friendly Neovim theme in the shades of heathers.☆10Jul 9, 2025Updated 8 months ago