Kubernetes Easter CTF
☆59Jul 10, 2020Updated 5 years ago
Alternatives and similar repositories for k8s-ctf-rocks
Users that are interested in k8s-ctf-rocks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Going Florida on container keyring masks. A tool to demonstrate the ineffectivity containers have on isolating Linux Kernel keyrings.☆44Updated this week
- A collection of Docker and Kubernetes resources☆18Nov 14, 2022Updated 3 years ago
- little scripts of bash stuff that i've found handy.☆16Feb 2, 2019Updated 7 years ago
- RBAC in Kubernetes visualizer☆24Jun 11, 2019Updated 6 years ago
- The BlackAlps 2019 badge☆10Dec 4, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- LDAP Injection Vulnerability Application(Blog Sample Code)☆22Oct 4, 2018Updated 7 years ago
- ☆13May 17, 2016Updated 9 years ago
- A helpful tool for SREs to investigate and learn about ROSA clusters☆12Oct 21, 2024Updated last year
- Easily write tests and fuzz many different programs.☆12Dec 13, 2022Updated 3 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Outil de sécurité des architectures kubernetes avancées☆82Nov 27, 2025Updated 4 months ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A PowerShell script to prevent Sysmon from writing its events☆17Apr 23, 2020Updated 5 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Software Modules and Examples for the PiFex☆14Aug 23, 2025Updated 7 months ago
- This repository contains examples of information security policies, GDPR protocols and an operational security guide with examples of bes…☆13Apr 6, 2023Updated 2 years ago
- This is a docker environment ready set up for multiple WooCommerce Plugin vulnerabilities.☆30Dec 1, 2020Updated 5 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A beginner-friendly CTF about Kubernetes security.☆81Aug 9, 2022Updated 3 years ago
- Collection of Slides From My Conference Talks☆20Nov 21, 2022Updated 3 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- TIBER-Cases is a project created to give cases of The Hive platform for Threat Intelligence Analysts mainly. All the cases are mapped to …☆27Jul 13, 2022Updated 3 years ago
- Freyja is a Golang, Purple Team agent that compiles into Windows, Linux and macOS x64 executables.☆41Oct 29, 2024Updated last year
- Find cloud assets that no one wants exposed 🔎 ☁️☆348Jul 20, 2020Updated 5 years ago
- Golang Dev Env Dockerfile☆17Mar 29, 2019Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Feb 10, 2022Updated 4 years ago
- Attack Tool Timing and Reporting - Structured Attack Logging Format☆22Nov 4, 2022Updated 3 years ago
- A CLI that scans for sensitive data in source code☆14Mar 22, 2023Updated 3 years ago
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- Go client for Elasticsearch OSINT platform☆15Nov 4, 2023Updated 2 years ago
- ☆15Oct 29, 2024Updated last year
- Repository for all the workshop content delivered at nullcon X on 1st of March 2019☆80Apr 4, 2019Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- Terraform modules for CloudSploit Scanner☆14Jul 12, 2022Updated 3 years ago
- A deliberately vulnerable Kubernetes cluster☆132Dec 15, 2023Updated 2 years ago