nccgroup / kubetcdLinks
Post-exploit a compromised etcd, gain persistence and remote shell to nodes.
☆80Updated last year
Alternatives and similar repositories for kubetcd
Users that are interested in kubetcd are comparing it to the libraries listed below
Sorting:
- Here is a common vulnerability when Kubernetes Controller designed.☆11Updated last year
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clu…☆103Updated last month
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- PoC and Detection for CVE-2024-21626☆76Updated last year
- POC for CVE-2022-23648☆36Updated 3 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- A penetration toolkit for container environment☆90Updated last week
- ☆31Updated 2 years ago
- KubeStalk discovers Kubernetes and related infrastructure based attack surface from a black-box perspective.☆171Updated 5 months ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- Here is useful scripts collections. You can forge tickets locally with secret keys or certificates. It's useful when you want backdoor/pe…☆18Updated last year
- This repository contain any information that can be used to hack Kubernetes☆105Updated 3 years ago
- Powerful+Fast+Low Privilege Kubernetes discovery tools☆230Updated 2 weeks ago
- ☆41Updated last month
- Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?☆39Updated 10 months ago
- ☆49Updated 3 months ago
- Simple tool to decrypt Jenkins encrypted strings☆76Updated 2 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-…☆83Updated last month
- kubernetes rootkit☆31Updated last year
- Worlds First Public POC for CVE-2025-1974☆89Updated 2 months ago
- 🌐 Visualize and explore IaC ✒️ Create and share notes in VS Code 🤝 Sync notes and findings in real-time with friends☆73Updated last year
- Simple webhook to block exploitation of CVE-2022-0811☆8Updated 3 years ago
- A fingerprint generation helper for nuclei network templates☆73Updated 2 years ago
- Test whether a container environment is vulnerable to container escapes via CVE-2022-0492☆48Updated 3 years ago
- NamespaceHound is the tool for detecting the risk of potential namespace crossing violations in multi-tenant clusters.☆100Updated 5 months ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago