nccgroup / kubetcd
Post-exploit a compromised etcd, gain persistence and remote shell to nodes.
☆70Updated 4 months ago
Related projects: ⓘ
- Here is a common vulnerability when Kubernetes Controller designed.☆12Updated 9 months ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 2 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆38Updated 2 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆77Updated 2 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆89Updated 3 years ago
- Powerful+Fast+Low Privilege Kubernetes service discovery tools via kubernetes DNS service. Currently supported service ip-port BruteForci…☆132Updated 2 weeks ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Correlates serviceaccounts and pods to the permissions granted to them via rolebindings and clusterrolesbindings.☆34Updated 2 years ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 5 years ago
- POC for CVE-2022-23648☆35Updated 2 years ago
- ☆31Updated last year
- Simple webhook to block exploitation of CVE-2022-0811☆8Updated 2 years ago
- PoC and Detection for CVE-2024-21626☆70Updated 7 months ago
- This repository contain any information that can be used to hack Kubernetes☆98Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆78Updated 7 months ago
- Cloud Penetration Testing Toolkit☆92Updated 2 months ago
- Simple tool to decrypt Jenkins encrypted strings☆68Updated last year
- A penetration toolkit for container environment☆75Updated 2 weeks ago
- Cloud agnostic IAM permissions enumerator☆138Updated 3 weeks ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆53Updated 4 years ago
- Nuclei templates for K8S security scanning☆102Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆71Updated last year
- Konstellation is a configuration-driven CLI tool to enumerate cloud resources and store the data into Neo4j.☆19Updated last year
- Detect and bypass Istio sidecar☆18Updated 2 years ago
- jws2pubkey tool☆36Updated 3 months ago
- Deobfuscate Log4Shell payloads with ease.☆159Updated 2 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆56Updated 6 months ago
- POC for Spring Kafka Deserialization Vulnerability CVE-2023-34040☆43Updated last year
- Proof of concept for CVE-2020-15257 in containerd.☆16Updated 3 years ago
- ZDI presentations, publications, whitepapers etc☆43Updated 11 months ago