Kubernetes Unhinged Shell π
β46Oct 8, 2022Updated 3 years ago
Alternatives and similar repositories for kush
Users that are interested in kush are comparing it to the libraries listed below
Sorting:
- β33Feb 26, 2022Updated 4 years ago
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.β75Sep 12, 2023Updated 2 years ago
- β29May 12, 2025Updated 9 months ago
- Offensive tool for guessing Active Directory credentials via Kerberosβ10Jan 1, 2024Updated 2 years ago
- WAF bypass PoCβ50Oct 9, 2023Updated 2 years ago
- The Dirty Pipe Vulnerabilityβ46Mar 8, 2022Updated 3 years ago
- Simple stacking window manager for X11β11Aug 26, 2020Updated 5 years ago
- Pickle decompiler plugin for Radare2β18Aug 6, 2023Updated 2 years ago
- β13Dec 27, 2014Updated 11 years ago
- Collection of our CTF write-upsβ28Aug 7, 2020Updated 5 years ago
- β11Apr 7, 2022Updated 3 years ago
- Convert an IP into Alternative / Obfuscated versions of itselfβ14Aug 13, 2022Updated 3 years ago
- My experiments in weaponizing Nim (https://nim-lang.org/)β14Nov 30, 2021Updated 4 years ago
- ysoserial.net docker imageβ29Sep 23, 2024Updated last year
- tp3注ε ₯ζ»η»β19Jan 6, 2022Updated 4 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issueβ13Dec 28, 2021Updated 4 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.β23Aug 30, 2024Updated last year
- Proof of concept code for Datadog Security Labs referenced exploits.β449Feb 13, 2026Updated 2 weeks ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-envβ102Sep 10, 2019Updated 6 years ago
- ASCII Creationβ33Sep 1, 2025Updated 6 months ago
- Small POC for process ghostingβ40Feb 1, 2022Updated 4 years ago
- Linux Process Discovery. C Library, Go bindings, Runtime.β223Jul 20, 2022Updated 3 years ago
- DNS Agent serving zones stored in memory, downloaded via HTTP(S) in JSON formatβ21Apr 6, 2020Updated 5 years ago
- Proof-of-concept implementation for the paper "Indirect Meltdown: Building Novel Side-Channel Attacks from Transient Execution Attacks" (β¦β22Sep 24, 2023Updated 2 years ago
- An unsorted collection of little tools and scripts I've made that don't fit anywhere elseβ19Jul 15, 2022Updated 3 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.β41Dec 12, 2023Updated 2 years ago
- Kubernetes audit logging, when you don't control the control planeβ91Updated this week
- PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-343β¦β43Sep 25, 2020Updated 5 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).β88Jan 28, 2024Updated 2 years ago
- egrets monitors egressβ47Apr 12, 2020Updated 5 years ago
- GNUnet in Goβ20Jul 20, 2023Updated 2 years ago
- Polymorphic ELF Virusβ18Mar 19, 2022Updated 3 years ago
- Collection of offensive tools targeting Microsoft Azureβ218Jan 18, 2023Updated 3 years ago
- Playing with PE's and Building Structures by Handβ22Apr 21, 2022Updated 3 years ago
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualizβ¦β23Updated this week
- IMDSPOOF is a cyber deception tool that spoofs the AWS IMDS service to return HoneyTokens that can be alerted on.β106Nov 24, 2023Updated 2 years ago
- Sample implementations of the attacks shown in https://eprint.iacr.org/2020/1456β21Dec 2, 2021Updated 4 years ago
- Linux CS bypass techniqueβ32Feb 4, 2025Updated last year
- Go module that allows you to authenticate to Azure with a well known client ID using interactive logon and grab the tokenβ27Dec 1, 2022Updated 3 years ago