Post-exploit a compromised etcd, gain persistence and remote shell to nodes.
☆92May 7, 2024Updated last year
Alternatives and similar repositories for kubetcd
Users that are interested in kubetcd are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆105May 20, 2025Updated 10 months ago
- ☆11May 25, 2024Updated last year
- A penetration toolkit for container environment☆123Feb 14, 2026Updated 2 months ago
- Powerful+Fast+Low Privilege Kubernetes discovery tools☆272Jul 29, 2025Updated 8 months ago
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploit…☆92May 6, 2025Updated 11 months ago
- ☆33Aug 26, 2025Updated 7 months ago
- kubernetes rootkit☆34Dec 18, 2023Updated 2 years ago
- Here is a common vulnerability when Kubernetes Controller designed.☆10Dec 11, 2023Updated 2 years ago
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆20Apr 6, 2024Updated 2 years ago
- 读过的安全文章离线归档 | begin in 2023.11.23☆18Jun 4, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆32Sep 24, 2025Updated 6 months ago
- EndpointSearch 是一个探测云服务端点的扫描器。Endpoint Search is a sophisticated reconnaissance utility designed to discreetly identify and enumerate end…☆78Nov 8, 2024Updated last year
- Dockerfile and Kubernetes manifests for reproduce CVE-2024-3094☆14Apr 6, 2024Updated 2 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- anonymous to cluster-admin via Heapdump.☆30Nov 16, 2023Updated 2 years ago
- Docker 逃逸 Release Agent 利用始末☆68Nov 2, 2022Updated 3 years ago
- 🧰 Multi Tool Kubernetes Pentest Image☆257Mar 30, 2026Updated 2 weeks ago
- 构造字节在ASCII范围内的jar☆140Feb 14, 2022Updated 4 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆651Feb 15, 2025Updated last year
- Cloud Native Security News☆68Dec 27, 2024Updated last year
- Tool for building Kubernetes attack paths☆958Updated this week
- ☆53Mar 25, 2025Updated last year
- Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409) exploit☆83Oct 7, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Exploit for CVE-2021-25741 vulnerability☆28Jan 19, 2022Updated 4 years ago
- AWACS for RBAC. Tool for auditing CRUD permissions in Kubernetes' RBAC.☆46May 21, 2024Updated last year
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Nov 18, 2020Updated 5 years ago
- LC(List Cloud)是一个多云攻击面资产梳理工具☆640Oct 6, 2024Updated last year
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆41Nov 16, 2025Updated 4 months ago
- Zerologon exploit with restore DC password automatically☆147Mar 15, 2024Updated 2 years ago
- ☆11Nov 17, 2024Updated last year
- 用java实现构造openwire协议,利用activeMQ < 5.18.3 RCE 回显利用 内存马注入☆289Nov 20, 2023Updated 2 years ago
- A toolset to juggle AWS roles for persistent access☆62Aug 14, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Stack integrity verification to Detect SleepMask or CallStack Spoofer☆53Jul 13, 2025Updated 9 months ago
- Some ReadObject Sink With JDBC☆245May 8, 2024Updated last year
- awesome resources about cloud native security 🐿☆327Nov 4, 2023Updated 2 years ago
- ☆276Oct 28, 2021Updated 4 years ago
- 云原生安全漏洞收集☆18Jul 9, 2025Updated 9 months ago
- AK资源管理工具,阿里云/腾讯云/华为云/AWS/UCLOUD/京东云/百度云/七牛云存储/火山引擎 AccessKey AccessKeySecret,利用AK获取资源信息和操作资源,ECS/CVM/E2/UHOST/ECI/BCC执行命令,OSS/COS/S3/BOS…☆780Feb 13, 2025Updated last year
- Attack Active Directory Trusts with a single tool☆14Jan 15, 2025Updated last year