thedojoseries / kubernetes-ctfLinks
The Challenge for OWASP's Kubernetes CTF
☆33Updated 2 years ago
Alternatives and similar repositories for kubernetes-ctf
Users that are interested in kubernetes-ctf are comparing it to the libraries listed below
Sorting:
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- POC for CVE-2022-23648☆36Updated 3 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- ☆98Updated 4 months ago
- book website☆70Updated 3 years ago
- ☆18Updated 2 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Research on various techniques to bypass default falco ruleset (based on falco v0.28.1).☆81Updated last year
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆80Updated last year
- This repository contain any information that can be used to hack Kubernetes☆105Updated 3 years ago
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 5 years ago
- ☆41Updated last month
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- OWASP Foundation Web Respository☆35Updated 9 months ago
- This repository contains a sample Java application vulnerable to command injection and server-side request forgery (SSRF).☆19Updated 3 months ago
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆113Updated 6 years ago
- A POC for DNS spoofing in kubernetes clusters. Runs with minimum capabilities, on default installations of kuberentes.☆78Updated 5 years ago
- Repository for the OWASP DevSlop's Docker Game Day☆19Updated last year
- Run CodeQL queries at scale using Multi-Repository Variant Analysis (MRVA)☆59Updated 2 months ago
- Kubernetes Pwnage for all☆57Updated 4 years ago
- Bundle of security analysis scripts for keras tensorflow models☆14Updated last year
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆23Updated 4 years ago
- Blogpost series showcasing interesting cloud - web app security bugs☆49Updated 2 years ago
- Kubernetes Security Testing Guide☆26Updated last year
- ☆29Updated 4 years ago
- ☆31Updated 2 years ago