nccgroup / kubetcd
Post-exploit a compromised etcd, gain persistence and remote shell to nodes.
☆73Updated 8 months ago
Alternatives and similar repositories for kubetcd:
Users that are interested in kubetcd are comparing it to the libraries listed below
- Here is a common vulnerability when Kubernetes Controller designed.☆12Updated last year
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆39Updated 2 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆77Updated 2 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆93Updated 4 years ago
- This repository contain any information that can be used to hack Kubernetes☆100Updated 2 years ago
- Powerful+Fast+Low Privilege Kubernetes discovery tools☆161Updated this week
- Simple webhook to block exploitation of CVE-2022-0811☆8Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆80Updated last year
- Simple tool to decrypt Jenkins encrypted strings☆75Updated last year
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- PoC and Detection for CVE-2024-21626☆72Updated 11 months ago
- POC for CVE-2022-23648☆36Updated 2 years ago
- ☆31Updated 2 years ago
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆37Updated 5 months ago
- ☆18Updated 2 years ago
- ☆25Updated 8 months ago
- Nuclei templates for K8S security scanning☆101Updated 3 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆162Updated last year
- A penetration toolkit for container environment☆77Updated 2 weeks ago
- Cloud Penetration Testing Toolkit☆98Updated last month
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆170Updated last week
- Leaky Vessels Dynamic Detector☆101Updated 7 months ago
- A project demonstrating an app that is vulnerable to Spring Security authorization bypass CVE-2022-31692☆36Updated 2 years ago
- book website☆67Updated 2 years ago
- ☆25Updated 3 years ago
- Cloud agnostic IAM permissions enumerator☆139Updated 5 months ago
- Detect and bypass Istio sidecar☆20Updated 3 years ago
- A fingerprint generation helper for nuclei network templates☆72Updated 2 years ago