loodse / kubectl-hackingLinks
$ kubectl hacking - my journey with kate
☆37Updated 4 years ago
Alternatives and similar repositories for kubectl-hacking
Users that are interested in kubectl-hacking are comparing it to the libraries listed below
Sorting:
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆163Updated 2 months ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆177Updated last year
- ☆50Updated 6 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runti…☆58Updated last year
- ☆44Updated 9 months ago
- Dockerfile Security Checker using OPA Rego policies with Conftest☆62Updated 3 years ago
- This repository contain any information that can be used to hack Kubernetes☆111Updated 3 years ago
- Determine privileges from cloud credentials via brute-force testing.☆68Updated last year
- a tool to audit the istio service mesh☆174Updated 4 years ago
- WAF bypass PoC☆50Updated 2 years ago
- ☆127Updated last year
- ☆12Updated last year
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated 2 years ago
- Kubernetes Pwnage for all☆57Updated 5 years ago
- ☆12Updated 4 years ago
- ☆31Updated 3 years ago
- Container 📦 Security 🔐 Best Practices Checklist 📋 & Slides☆69Updated 5 years ago
- Ansible role to detect Log4Shell exploitation attempts☆18Updated 4 years ago
- Kubernetes Stranger Danger☆68Updated last month
- Tool for reconnaissance of AWS cloud environments☆16Updated 2 years ago
- ☆60Updated 2 years ago
- book website☆72Updated 4 years ago
- Tool for auditing RBACs in Kubernetes☆226Updated 2 years ago
- Creates Kubernetes Golden Tickets through ServiceAccount token forging and user certificate forging.☆51Updated 11 months ago
- Some helpful Helm Charts for pentesters☆38Updated 7 years ago
- The Swiss Army Container for Cloud Native Security. Container with all the list of useful tools/commands while hacking and securing Conta…☆286Updated 2 years ago
- Scan your account for the use of untrusted AMIs☆31Updated 2 months ago
- Discover vulnerabilities and container image misconfiguration in production environments.☆55Updated last month
- ☆51Updated 5 years ago
- EC2StepShell is an AWS post-exploitation tool for getting high privileges reverse shells in public or private EC2 instances.☆68Updated last year