Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)
☆114Jan 14, 2019Updated 7 years ago
Alternatives and similar repositories for kubelet-anon-rce
Users that are interested in kubelet-anon-rce are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2020-3452 exploit☆24Aug 1, 2020Updated 5 years ago
- ☆16Jan 5, 2021Updated 5 years ago
- CVE-2020-5398 - RFD(Reflected File Download) Attack for Spring MVC☆86Dec 15, 2022Updated 3 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Automatically identify deserialisation issues in Java and .NET applications by using active and passive scans☆583Sep 7, 2021Updated 4 years ago
- A Java serializer in JavaScript☆80May 21, 2018Updated 7 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆100Nov 18, 2020Updated 5 years ago
- fastjson remote code execute poc 直接用intellij IDEA打开即可 首先编译得到Test.class,然后运行Poc.java☆403Dec 16, 2022Updated 3 years ago
- Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (…☆316Apr 1, 2019Updated 6 years ago
- Kubernetes Kubelet RCE Automated Script. Utilizes both "run" and "exec" debug handlers.☆10Sep 28, 2020Updated 5 years ago
- Fast browser-based network discovery module☆115May 26, 2021Updated 4 years ago
- Apache Solr Injection Research☆580Jan 28, 2020Updated 6 years ago
- Thymeleaf SSTI Bypass☆13Nov 24, 2021Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Spring Boot Actuator + Spring Cloud Vul Env☆19Dec 25, 2019Updated 6 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- A container analysis and exploitation tool for pentesters and engineers.☆677Sep 27, 2023Updated 2 years ago
- k0otkit is a universal post-penetration technique which could be used in penetrations against Kubernetes clusters.☆301Aug 30, 2021Updated 4 years ago
- this is some scripts for pentesting zabbix server☆13Feb 25, 2018Updated 8 years ago
- 基于burpsuite headless 的代理式被动扫描系统☆95Feb 10, 2020Updated 6 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- CVE-2019-11580 Atlassian Crowd and Crowd Data Center RCE☆106Jul 18, 2019Updated 6 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- HTTP/HTTPS proxy server by golang [high performance version]☆54Jul 25, 2020Updated 5 years ago
- Shiro_721 exp 纯手工实现Padding Oracle整个过程☆67Nov 20, 2019Updated 6 years ago
- Kernel Support for miscellaneous (your favourite) exploits☆22Apr 19, 2017Updated 8 years ago
- CobaltStrike External C2 for Websockets☆197Jul 16, 2019Updated 6 years ago
- .Net 反序列化漏洞学习☆15Aug 29, 2020Updated 5 years ago
- ☆16Jul 20, 2020Updated 5 years ago
- Peirates - Kubernetes Penetration Testing tool☆1,429Jan 20, 2026Updated 2 months ago
- Java安全研究与安全开发面试题库,同是也是常见知识点的梳理和总结,包含问题和详细的答案,计划定期更新☆16Apr 30, 2022Updated 3 years ago
- Learn how to get a reverse shell from JIRA application server☆24Dec 2, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Jackson Rce For CVE-2019-12384☆102Jul 24, 2019Updated 6 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- RMIScout uses wordlist and bruteforce strategies to enumerate Java RMI functions and exploit RMI parameter unmarshalling vulnerabilities☆447Sep 7, 2022Updated 3 years ago
- Mogwai Java Management Extensions (JMX) Exploitation Toolkit☆174Jul 21, 2016Updated 9 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Jun 10, 2020Updated 5 years ago
- ☆11Dec 18, 2018Updated 7 years ago
- Capture screenshots from .NET using .NET methods or Windows API calls☆66Mar 9, 2020Updated 6 years ago