☆51May 19, 2020Updated 5 years ago
Alternatives and similar repositories for blackhat-2019
Users that are interested in blackhat-2019 are comparing it to the libraries listed below
Sorting:
- ☆12May 2, 2023Updated 2 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- ☆29Jan 31, 2025Updated last year
- Scripts to demonstrate VPC Service Controls between tenant and shared projects☆12Jun 11, 2019Updated 6 years ago
- ☆14Dec 7, 2022Updated 3 years ago
- kurl: curl for Kubernetes☆38Dec 26, 2016Updated 9 years ago
- An OPA library to develop IT Control policies, for the IBM Cloud☆17Sep 26, 2022Updated 3 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Kubernetes Common Configuration Scoring System☆121Jul 10, 2022Updated 3 years ago
- ☆17Jan 23, 2021Updated 5 years ago
- ☆83Dec 5, 2019Updated 6 years ago
- This repository holds a target infrastructure you can use for running the nimbostratus tools.☆24Mar 9, 2015Updated 10 years ago
- This repo gives an overview of some GCP metadata API attack and defend patterns☆79Mar 23, 2020Updated 5 years ago
- ☆23Mar 18, 2022Updated 3 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- ☆21Nov 30, 2019Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- ZAP Management Scripts☆23Updated this week
- Tiny Calculator with support of +, -, *, /, ^, sin, cos, tan...☆10Apr 2, 2024Updated last year
- Telemetry for OpenClaw - Captures tool calls, LLM usage, agent lifecycle, and message events. Outputs to JSONL file and optionally to sys…☆58Feb 5, 2026Updated last month
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Web application that convert docker-compose files to kubernetes files☆26Dec 11, 2022Updated 3 years ago
- CTF Writeups☆26Oct 6, 2019Updated 6 years ago
- Owasp Zap chart for Kubernetes☆50Feb 9, 2022Updated 4 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22May 24, 2019Updated 6 years ago
- Different code-injections techniques under a common tool☆30May 3, 2020Updated 5 years ago
- Continuous Zero-Downtime Deployments for Kubernetes & Istio☆27Sep 20, 2018Updated 7 years ago
- AWS Metadata Proxy for protection against SSRF☆68Mar 3, 2020Updated 6 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- Cloudformation Template and Lambda to detect if Instance Profile credentials are being used outside your AWS Account.☆29Aug 18, 2019Updated 6 years ago
- A command line tool for validating Kubernetes configs with rego☆65Jul 18, 2019Updated 6 years ago
- (WIP) A terraform / kitchen-terraform hardening baseline for the cis-aws-foundations-baseline☆24Dec 14, 2025Updated 2 months ago
- Generate K8s RBAC policies based on e2e test runs☆28Jul 6, 2021Updated 4 years ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆33May 30, 2024Updated last year
- ☆28Aug 6, 2020Updated 5 years ago
- Jenkins plugin that adds Anchore container image analysis and policy evaluation to Jenkins as a build step☆30Dec 20, 2024Updated last year
- Labs for Threat Modelling training delivered by ControlPlane☆35Feb 24, 2026Updated last week
- Growing repository of Infrastructure as Code demos (initially created for DevOps Wall Street)☆34Oct 31, 2023Updated 2 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 7 months ago