Proof of Concept exploit for Kubernetes CVE-2020-8559
☆20Jul 22, 2020Updated 5 years ago
Alternatives and similar repositories for POC-2020-8559
Users that are interested in POC-2020-8559 are comparing it to the libraries listed below
Sorting:
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Jul 23, 2020Updated 5 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆43Jul 22, 2020Updated 5 years ago
- Automated GKE Kubelet Impersonation and Cluster Secret Stealer via kube-env☆102Sep 10, 2019Updated 6 years ago
- A VMware cloud native podcast. Exploring cloud native, one buzzword at a time!☆25Jan 31, 2023Updated 3 years ago
- Markdown Version of the DHS/CISA Secure Software Development Self Attestation Form.☆22May 4, 2023Updated 2 years ago
- AMF Plugin for JMeter☆37May 24, 2012Updated 13 years ago
- HTTP/HTTPS proxy server by golang [high performance version]☆54Jul 25, 2020Updated 5 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- ☆22Aug 3, 2024Updated last year
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- ☆27Feb 19, 2026Updated 2 weeks ago
- This project demonstrates a series of best practices for improving the security of containerized applications deployed to Kubernetes Engi…☆71Aug 19, 2024Updated last year
- CVE-2020-2021☆22Oct 12, 2020Updated 5 years ago
- Getting Started With Cloud Native Security☆72Aug 17, 2020Updated 5 years ago
- List of all previous CNCF Project's Security Audit Reports☆38Jan 13, 2021Updated 5 years ago
- CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE☆32Jun 5, 2020Updated 5 years ago
- kodi - free☆12Feb 23, 2026Updated 2 weeks ago
- @dave-thompson's QMK community modules☆13Feb 18, 2026Updated 2 weeks ago
- ClusterIP Validating Webhook☆37Mar 4, 2023Updated 3 years ago
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 5 months ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆79Aug 30, 2019Updated 6 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆89Jan 28, 2024Updated 2 years ago
- ☆39Aug 13, 2021Updated 4 years ago
- Security testing tool for Kubernetes, abusing kubelet credentials on public cloud providers.☆164Nov 28, 2025Updated 3 months ago
- ☆40Aug 2, 2024Updated last year
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- POC for CVE-2022-23648☆36Mar 29, 2022Updated 3 years ago
- archives for Tongji CTF 2017☆10Oct 25, 2023Updated 2 years ago
- Workshop - Windows Container☆11Dec 20, 2017Updated 8 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Tool to start a python http server in a simple way☆10Mar 30, 2022Updated 3 years ago
- Slides, collaboration doc, and code building a recommendation system example presented in a meetup talks☆14Sep 24, 2020Updated 5 years ago
- OWASP Kubernetes Security Testing Guide☆41Dec 22, 2025Updated 2 months ago
- ⛔️ [DEPRECATED] Simple, backwards-compatible, Go and Java friendly protoc wrapper with remote proto files support☆24Oct 22, 2024Updated last year
- Go bindings for creating BPF programs.☆13Jul 2, 2021Updated 4 years ago
- Deprecated; please use https://github.com/marketplace/actions/fortify-ast-scan instead☆13Nov 1, 2023Updated 2 years ago
- Rust learning project, built live on Youtube with Ryan Levick☆10Nov 17, 2019Updated 6 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago