nccgroup / insject
insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.
β50Updated 3 years ago
Alternatives and similar repositories for insject:
Users that are interested in insject are comparing it to the libraries listed below
- egrets monitors egressβ45Updated 5 years ago
- Kubernetes Unhinged Shell πβ45Updated 2 years ago
- A beginner-friendly CTF about Kubernetes security.β77Updated 2 years ago
- A collection of projects demonstrating various commandline cloaking techniques on Linuxβ57Updated 2 years ago
- An eBPF detection program for CVE-2022-0847β28Updated 2 years ago
- POC for CVE-2022-23648β36Updated 3 years ago
- β11Updated 3 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.β21Updated 8 months ago
- β31Updated 2 years ago
- Exploit for CVE-2021-25741 vulnerabilityβ28Updated 3 years ago
- python3 scripts to help with aws triage needsβ15Updated 3 years ago
- An implementation of infrastructure-as-code scanning using dynamic tooling.β56Updated 3 years ago
- β72Updated this week
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypassβ18Updated 4 years ago
- Reference architecture and proof of concept implementation for supply chain security gatewayβ23Updated 2 years ago
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.β21Updated last year
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.β74Updated last year
- Kubernetes Pwnage for allβ57Updated 4 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)β25Updated 4 years ago
- Container Blackbox Security Auditing Tool: enumerates security configuration from within the target containerβ106Updated 6 years ago
- UniSBOM is a tool to build a software bill of materials on any platform with a unified data format.β34Updated 2 years ago
- Protect your Cloud Native Applications running on Kubernetes from malicious attacks with pre-registered source code, pre-registered runtiβ¦β55Updated 4 months ago
- CLI tool written in Go to generate Canary Tokens from https://canarytokens.orgβ11Updated 3 years ago
- Create tar/zip archives that try to exploit zipslip vulnerability.β47Updated 7 months ago
- β27Updated 5 months ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Toolβ25Updated 3 years ago
- β17Updated 2 years ago
- Some helpful Helm Charts for pentestersβ39Updated 6 years ago
- Modron - Cloud security complianceβ33Updated 4 months ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerabilityβ54Updated 4 years ago