A simple mitmproxy blueprint to intercept HTTPS traffic from app running on Kubernetes
☆75Apr 14, 2025Updated 11 months ago
Alternatives and similar repositories for k8s-sniff-https
Users that are interested in k8s-sniff-https are comparing it to the libraries listed below
Sorting:
- A Terraform module that makes it a snap to opt out of all AWS AI/ML data harvesting.☆30Jan 2, 2024Updated 2 years ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆137May 7, 2025Updated 10 months ago
- Simple plug-and-play Github Action to block unauthorized outbound traffic (egress) in your Github workflows☆119Updated this week
- ☆86Feb 4, 2026Updated last month
- Generative and mutative fuzzer for Kubernetes admission controller chains by automatically parsing the cluster api specification.☆75Sep 12, 2023Updated 2 years ago
- Proof-of-concept modular implant platform leveraging v8☆54Mar 4, 2025Updated last year
- Semgrep-based Policy Controller for Kubernetes☆47Apr 4, 2025Updated 11 months ago
- A tool to automatically give AWS IAM users access to your Kubernetes cluster.☆50Mar 10, 2026Updated last week
- A tool for scanning public or private AMIs for sensitive files and secrets. The tool follows the research made on AWS CloudQuarry where w…☆113Nov 13, 2024Updated last year
- FlowAnalyzer is a tool to help in testing and analyzing OAuth 2.0 Flows, including OpenID Connect (OIDC).☆181Jul 8, 2024Updated last year
- Sniff and attack networks that use IP-in-IP or VXLAN encapsulation protocols.☆23Aug 30, 2024Updated last year
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- ## Auto-archived due to inactivity. ## Tooling to simulate runtime attacks and test default runtime detections from Datadog Cloud Securit…☆37Oct 17, 2024Updated last year
- This tool analyzes a given Gitlab repository and searches for dangling or force-pushed commits containing potential secret or interesting…☆47Aug 16, 2024Updated last year
- A PoC to Simulate Ransomware Attack on AWS Environment☆33Oct 14, 2024Updated last year
- Configuration Language for Mortals☆12Feb 19, 2026Updated last month
- ☆30May 12, 2025Updated 10 months ago
- Compares and analyzes GCP IAM roles.☆78Mar 9, 2025Updated last year
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- Create tar/zip archives that try to exploit zipslip vulnerability.☆48Sep 20, 2024Updated last year
- Identify hardcoded secrets in static structured text (version 2)☆98Feb 5, 2025Updated last year
- Kubernetes-Operator to simplify RBAC configurations☆17Dec 8, 2025Updated 3 months ago
- Kubernetes Kubelet Image Credential Provider for Hashicorp Vault☆22Mar 6, 2026Updated 2 weeks ago
- EKS NG AMI Updater is an open source project that can be used to update kubernetes node group images.☆28Mar 8, 2026Updated last week
- ☆27May 6, 2024Updated last year
- This application was built to help reduce the amount of time it takes to review AWS Lambda code.☆61Nov 11, 2024Updated last year
- WAF bypass PoC☆50Oct 9, 2023Updated 2 years ago
- Kubernetes Unhinged Shell 😎☆46Oct 8, 2022Updated 3 years ago
- ☆21Oct 5, 2025Updated 5 months ago
- POC tool to create signed AWS API GET requests to bypass Guard Duty alerting of off-instance credential use via SSRF☆59Sep 20, 2023Updated 2 years ago
- A flexible threat detection platform that simplifies rule management and deployment using K8s CronJob and Helm, but can also run standalo…☆384Oct 1, 2024Updated last year
- An interactive CLI application for interacting with authenticated Jupyter instances.☆55May 7, 2025Updated 10 months ago
- Common Golang Packages for use by the Various Cloud Nuke Tools☆56Mar 12, 2026Updated last week
- 🧰 Multi Tool Kubernetes Pentest Image☆255Mar 3, 2026Updated 2 weeks ago
- Rules shared by the community from 100 Days of YARA 2025☆38Jan 2, 2026Updated 2 months ago
- ☆56Dec 13, 2025Updated 3 months ago
- Segugio allows the execution and tracking of critical steps in the malware detonation process, from clicking on the first stage to extrac…☆151Sep 21, 2024Updated last year
- Talos Node Updater is a small Go program that updates a Talos (https://www.talos.dev/) node.☆29Nov 6, 2025Updated 4 months ago
- Attaché provides an emulation layer for Cloud Provider IMDS APIs☆60Updated this week