thedojoseries / kubernetes-ctf
The Challenge for OWASP's Kubernetes CTF
☆32Updated last year
Alternatives and similar repositories for kubernetes-ctf:
Users that are interested in kubernetes-ctf are comparing it to the libraries listed below
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆94Updated 4 years ago
- POC for CVE-2022-23648☆36Updated 3 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- A beginner-friendly CTF about Kubernetes security.☆77Updated 2 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆23Updated 4 years ago
- ☆31Updated 2 years ago
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- ☆93Updated last month
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- Kubernetes Pwnage for all☆56Updated 4 years ago
- This repository contain any information that can be used to hack Kubernetes☆99Updated 2 years ago
- Joern Workshops☆25Updated 2 months ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆18Updated 3 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Updated 2 years ago
- ☆34Updated 2 years ago
- ☆14Updated 5 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆77Updated 5 years ago
- Repository for the OWASP DevSlop's Docker Game Day☆18Updated last year
- book website☆67Updated 3 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 4 years ago
- Some helpful Helm Charts for pentesters☆39Updated 6 years ago
- HTTP Desync Attack☆28Updated 4 years ago
- ☆18Updated 2 years ago
- OWASP Foundation Web Respository☆34Updated 7 months ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago