Post-exploit a compromised etcd, gain persistence and remote shell to nodes.
☆92May 7, 2024Updated last year
Alternatives and similar repositories for kubetcd
Users that are interested in kubetcd are comparing it to the libraries listed below
Sorting:
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆104May 20, 2025Updated 9 months ago
- ☆11May 25, 2024Updated last year
- Powerful+Fast+Low Privilege Kubernetes discovery tools☆265Jul 29, 2025Updated 7 months ago
- A penetration toolkit for container environment☆122Feb 14, 2026Updated 2 weeks ago
- Here is a common vulnerability when Kubernetes Controller designed.☆10Dec 11, 2023Updated 2 years ago
- 构造字节在ASCII范围内的jar☆139Feb 14, 2022Updated 4 years ago
- Docker 逃逸 Release Agent 利用始末☆68Nov 2, 2022Updated 3 years ago
- IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploit…☆92May 6, 2025Updated 9 months ago
- anonymous to cluster-admin via Heapdump.☆30Nov 16, 2023Updated 2 years ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- ZKar is a Java serialization protocol analysis tool implement in Go.☆649Feb 15, 2025Updated last year
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆20Apr 6, 2024Updated last year
- Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) exploit☆83Oct 7, 2024Updated last year
- EndpointSearch 是一个探测云服务端点的扫描器。Endpoint Search is a sophisticated reconnaissance utility designed to discreetly identify and enumerate end…☆79Nov 8, 2024Updated last year
- poc for cve-2025-53772☆46Dec 10, 2025Updated 2 months ago
- ☆32Aug 26, 2025Updated 6 months ago
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- Some ReadObject Sink With JDBC☆243May 8, 2024Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- ☆12Nov 25, 2024Updated last year
- ☆12Nov 17, 2024Updated last year
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆288Nov 20, 2023Updated 2 years ago
- Tool for building Kubernetes attack paths☆943Updated this week
- Common Exploitation Techniques for Java RCE Vulnerabilities in Real-World Scenarios | 实战场景较通用的 Java Rce 相关漏洞的利用方式☆545Mar 6, 2025Updated 11 months ago
- Research analysis☆56Dec 2, 2025Updated 3 months ago
- Impacket with --remove-mic-partial☆28Jan 8, 2026Updated last month
- havoc2nginx is a simple python script that converts Havoc Framework's yaotl malleable c2 profile to Nginx configuration file format. Most…☆12May 8, 2023Updated 2 years ago
- Just a nice little shellcode loader using unconventional methods to avoid using signatured APIs☆23Jul 11, 2025Updated 7 months ago
- Zerologon exploit with restore DC password automatically☆145Mar 15, 2024Updated last year
- C# 读取本机对外RDP连接记录和其他主机对该主机的连接记录,从而在内网渗透中获取更多可通内网网段信息以及定位运维管理人员主机☆431Jan 28, 2021Updated 5 years ago
- Alternative Shellcode Execution Via Callbacks Rewrite In C#☆90Apr 28, 2023Updated 2 years ago
- LC(List Cloud)是一个多云攻击面资产梳理工具☆635Oct 6, 2024Updated last year
- 通过正则搜索、批量反编译特定Jar包中的class名称☆320Dec 9, 2021Updated 4 years ago
- 《深入JDBC安全:特殊URL构造与不出网反序列化利用技术揭秘》对应研究总结项目 "Deep Dive into JDBC Security: Special URL Construction and Non-Networked Deserialization Explo…☆571Feb 7, 2026Updated 3 weeks ago
- ☆307Feb 27, 2025Updated last year
- record some AD security and Red Team contents☆14Dec 10, 2019Updated 6 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- A tool to assist DLL hijacking via the Havoc GUI☆12Jan 9, 2024Updated 2 years ago