A beginner-friendly CTF about Kubernetes security.
☆81Aug 9, 2022Updated 3 years ago
Alternatives and similar repositories for minik8s-ctf
Users that are interested in minik8s-ctf are comparing it to the libraries listed below
Sorting:
- Man in the middle for NLA enabled RDP in python☆15Nov 26, 2021Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Kubernetes focused container assessment and context discovery tool for penetration testing☆477Nov 7, 2025Updated 4 months ago
- Tool to spray AWS Console IAM Logins☆35Jun 15, 2022Updated 3 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Slack alert bot for matching Github Audit Events☆10Nov 12, 2024Updated last year
- A small experiment on assigning a processes threads a specific CPU and then blocking it with a high priority thread☆30Sep 24, 2025Updated 5 months ago
- ☆15Oct 29, 2024Updated last year
- Collection of tools related to 7z, stego, and CTFs☆14Oct 9, 2020Updated 5 years ago
- Find unicode codepoints to use in normalisation and transformation attacks.☆11Mar 15, 2021Updated 4 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- Configuration security audit framework☆21Apr 27, 2016Updated 9 years ago
- EasyCTF IV☆10Feb 21, 2018Updated 8 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 6 years ago
- DNS Dashboard for hunting and identifying beaconing☆16Jul 29, 2020Updated 5 years ago
- ☆28Aug 6, 2020Updated 5 years ago
- Ejemplos del curso Docker sencillo para programadores☆11Sep 2, 2017Updated 8 years ago
- ☆20Feb 6, 2024Updated 2 years ago
- macOS from a blue perspective 🧢☆15Apr 13, 2023Updated 2 years ago
- Prevent SSRF attacks on AWS EC2 via automated upgrades to the more secure Instance Metadata Service v2 (IMDSv2).☆144May 1, 2025Updated 10 months ago
- Kausal's monorepo for Open Source projects☆14Feb 19, 2018Updated 8 years ago
- A BOF.NET program to split a file into smaller chunks and email it via a specified SMTP relay.☆15Jun 24, 2021Updated 4 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- Event Trace Log file parser in pure Python☆150Nov 27, 2020Updated 5 years ago
- HoneyZure is a honeypot tool specifically designed for Azure environments, fully provisioned through Terraform. It leverages a Log Analyt…☆17Jun 11, 2024Updated last year
- Ansible playbooks for AnsibleFest presentation on the Docker modules☆22May 23, 2014Updated 11 years ago
- Dumping LSA secrets: a story about task decorrelation☆14Jul 9, 2024Updated last year
- Example confgurations for kluctl☆16Jul 28, 2024Updated last year
- Carve $MFT records from a chunk of data (for instance a memory dump)☆16Aug 21, 2016Updated 9 years ago
- ☆22Jun 17, 2020Updated 5 years ago
- js-beautifier extension for Burp Suite☆30Jun 24, 2013Updated 12 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Kerberos laboratory to better understand and then detecting attack on kerberos☆70Jun 11, 2021Updated 4 years ago
- An (WIP) EDR Evasion tool for x64 Windows & Linux binaries that utilizes Nanomites, written in Rust.☆21Dec 15, 2024Updated last year
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Dec 4, 2013Updated 12 years ago
- ChatGPT Timestamp Chrome Extension☆59Feb 21, 2026Updated 2 weeks ago