serain / kubelet-anon-rce
Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)
☆112Updated 6 years ago
Alternatives and similar repositories for kubelet-anon-rce
Users that are interested in kubelet-anon-rce are comparing it to the libraries listed below
Sorting:
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- Citrix ADC Remote Code Execution☆83Updated 5 years ago
- Some private tools i decided to release for public.☆49Updated last year
- Sample Spring Boot App Demonstrating RCE via Exposed env Actuator and H2 Database☆106Updated 5 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Updated 4 years ago
- This tool implements a cloud version of the Shadow Copy attack against domain controllers running in AWS using only the EC2:CreateSnapsho…☆120Updated 5 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- Hacking Artifactory with server side template injection☆51Updated 5 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- Example Vulnerable .NET HTTP Remoting☆84Updated 6 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆29Updated 3 years ago
- RmiTaste allows security professionals to detect, enumerate, interact and exploit RMI services by calling remote methods with gadgets fro…☆107Updated 4 years ago
- Here you can get full exploit for SAP NetWeaver AS JAVA☆76Updated 7 years ago
- Exploitation toolkit for RichFaces☆103Updated last year
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- DupeKeyInjector☆135Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- Citrix ADC Vulns☆87Updated 4 years ago
- S2-061 CVE-2020-17530☆29Updated 4 years ago
- CVE-2020-2021☆20Updated 4 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 5 years ago
- A fake JDBC driver that allows OS command execution.☆124Updated 2 years ago
- ☆111Updated 5 years ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Nuclei templates for K8S security scanning☆101Updated 3 years ago
- Atlassian JIRA Template injection vulnerability RCE☆93Updated 5 years ago
- Authenticated SSRF in Grafana☆82Updated 10 months ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 4 years ago
- ☆63Updated 5 years ago