Post-exploit a compromised etcd, gain persistence and remote shell to nodes.
☆92May 7, 2024Updated last year
Alternatives and similar repositories for kubetcd
Users that are interested in kubetcd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆105May 20, 2025Updated 10 months ago
- ☆11May 25, 2024Updated last year
- A penetration toolkit for container environment☆123Feb 14, 2026Updated last month
- Powerful+Fast+Low Privilege Kubernetes discovery tools☆268Jul 29, 2025Updated 7 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploit…☆92May 6, 2025Updated 10 months ago
- ☆33Aug 26, 2025Updated 6 months ago
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- Here is a common vulnerability when Kubernetes Controller designed.☆10Dec 11, 2023Updated 2 years ago
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆20Apr 6, 2024Updated last year
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- EndpointSearch 是一个探测云服务端点的扫描器。Endpoint Search is a sophisticated reconnaissance utility designed to discreetly identify and enumerate end…☆78Nov 8, 2024Updated last year
- Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094☆14Apr 6, 2024Updated last year
- anonymous to cluster-admin via Heapdump.☆30Nov 16, 2023Updated 2 years ago
- Docker 逃逸 Release Agent 利用始末☆68Nov 2, 2022Updated 3 years ago
- 🧰 Multi Tool Kubernetes Pentest Image☆255Mar 3, 2026Updated 3 weeks ago
- 构造字节在ASCII范围内的jar☆139Feb 14, 2022Updated 4 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆650Feb 15, 2025Updated last year
- Cloud Native Security News☆67Dec 27, 2024Updated last year
- Tool for building Kubernetes attack paths☆951Updated this week
- ☆53Mar 25, 2025Updated 11 months ago
- poc for cve-2025-53772☆46Dec 10, 2025Updated 3 months ago
- Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) exploit☆83Oct 7, 2024Updated last year
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆46May 21, 2024Updated last year
- Exploit for CVE-2021-25741 vulnerability☆28Jan 19, 2022Updated 4 years ago
- LC(List Cloud)是一个多云攻击面资产梳理工具☆638Oct 6, 2024Updated last year
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆41Nov 16, 2025Updated 4 months ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Nov 18, 2020Updated 5 years ago
- Zerologon exploit with restore DC password automatically☆145Mar 15, 2024Updated 2 years ago
- ☆12Nov 17, 2024Updated last year
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆288Nov 20, 2023Updated 2 years ago
- A toolset to juggle AWS roles for persistent access☆63Aug 14, 2024Updated last year
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆53Jul 13, 2025Updated 8 months ago
- Some ReadObject Sink With JDBC☆243May 8, 2024Updated last year
- awesome resources about cloud native security 🐿☆326Nov 4, 2023Updated 2 years ago
- ☆275Oct 28, 2021Updated 4 years ago
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 8 months ago
- AK资源管理工具,阿里云/腾讯云/华为云/AWS/UCLOUD/京东云/百度云/七牛云存储/火山引擎 AccessKey AccessKeySecret,利用AK获取资源信息和操作资源,ECS/CVM/E2/UHOST/ECI/BCC执行命令,OSS/COS/S3/BOS…☆779Feb 13, 2025Updated last year