lightspin-tech / lightspin-2022-top-7-attack-paths
Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a list of the 2022 Top 7 Cloud Attack Paths across AWS, Azure, GCP, and Kubernetes as seen on the Lightspin Cloud Native Application Protection Platform.
☆40Updated 2 years ago
Alternatives and similar repositories for lightspin-2022-top-7-attack-paths:
Users that are interested in lightspin-2022-top-7-attack-paths are comparing it to the libraries listed below
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆74Updated 11 months ago
- POC for CVE-2022-23648☆36Updated 3 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆21Updated last year
- A fingerprint generation helper for nuclei network templates☆72Updated 2 years ago
- try to determine if a host is vulnerable to SpringShell CVE‐2022‐22965 and CVE‐2022‐22963