Kubernetes Easter CTF
☆59Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for k8s-ctf-rocks
Users that are interested in k8s-ctf-rocks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- A collection of Docker and Kubernetes resources☆18Nov 14, 2022Updated 3 years ago
- Some helpful Helm Charts for pentesters☆38Jan 28, 2019Updated 7 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- A helpful tool for SREs to investigate and learn about ROSA clusters☆12Oct 21, 2024Updated last year
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Container Security Workshop covering using Falco on Kubernetes.☆106Apr 30, 2021Updated 4 years ago
- Variety of kubectl krew tools usually security focused☆34Jul 17, 2025Updated 9 months ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Community generated list of API security tests to find OWASP top10, HackerOne top 10 vulnerabilities☆40Apr 8, 2026Updated last week
- Magento shoplift exploit is vulnerability which was discovered by CheckPoint team (http://blog.checkpoint.com/2015/04/20/analyzing-magent…☆13Aug 25, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Agressor script for Cobalt Strike to mark users as owned in bloodhound from the Cobalt Strike credentials tab.☆12Dec 21, 2019Updated 6 years ago
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 5 years ago
- Provide related capabilities to automate Harbor usage and improve its usabilities.☆14Nov 1, 2021Updated 4 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 7 months ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Aug 9, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Kubernetes Crd Conversion Webhook Example☆16Aug 30, 2019Updated 6 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆11Aug 1, 2021Updated 4 years ago
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆347Jul 20, 2020Updated 5 years ago
- ☆21Feb 6, 2024Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- A CLI tool for interacting with the Snyk API.☆11Jan 25, 2021Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SharpBuster is a C# implementation of a directory brute forcing tool. It's designed to be used via Cobalt Strike's execute-assembly and s…☆64Sep 2, 2020Updated 5 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Reproducible and extensible BloodHound playbooks☆44Jan 20, 2020Updated 6 years ago
- ☆15Oct 29, 2024Updated last year
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 7 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- A deliberately vulnerable Kubernetes cluster☆132Dec 15, 2023Updated 2 years ago