thedojoseries / kubernetes-ctfLinks
The Challenge for OWASP's Kubernetes CTF
☆33Updated 2 years ago
Alternatives and similar repositories for kubernetes-ctf
Users that are interested in kubernetes-ctf are comparing it to the libraries listed below
Sorting:
- CVE-2020-10749 PoC (Kubernetes MitM attacks via IPv6 rogue router advertisements)☆25Updated 4 years ago
- A beginner-friendly CTF about Kubernetes security.☆78Updated 2 years ago
- Exploit for CVE-2021-25741 vulnerability☆28Updated 3 years ago
- POC for CVE-2022-23648☆36Updated 3 years ago
- Kubernetes POC for utilizing write mount to /var/log for getting a root on the host☆96Updated 4 years ago
- Repository for the OWASP DevSlop's Docker Game Day☆19Updated last year
- Executes commands in a container on a kubelet endpoint that allows anonymous authentication (default)☆112Updated 6 years ago
- Exploit CVE-2021-25735: Kubernetes Validating Admission Webhook Bypass☆17Updated 4 years ago
- This is a PoC exploit for CVE-2020-8559 Kubernetes Vulnerability☆54Updated 4 years ago
- Proof of Concept exploit for Kubernetes CVE-2020-8559☆20Updated 4 years ago
- Information about Kubernetes CVE-2020-8558, including proof of concept exploit.☆42Updated 4 years ago
- Container Excape PoC for CVE-2022-0847 "DirtyPipe"☆78Updated 3 years ago
- Jekyll Files for cloudsecwiki.com☆50Updated 3 years ago
- PoC for CVE-2020-8617 (BIND)☆45Updated 5 years ago
- Post-exploit a compromised etcd, gain persistence and remote shell to nodes.☆80Updated last year
- The challenge writeups and solutions for yookiterm-challenge-files☆38Updated 2 years ago
- ☆31Updated 2 years ago
- This repository contain any information that can be used to hack Kubernetes☆104Updated 2 years ago
- A penetration toolkit for container environment☆81Updated this week
- insject is a tool for poking at containers. It enables you to run an arbitrary command in a container or any mix of Linux namespaces.☆50Updated 3 years ago
- ☆34Updated 3 years ago
- ☆29Updated 4 years ago
- book website☆69Updated 3 years ago
- Based on Lightspin proprietary data, research, and our tracking of cloud security trends in the market, our research team has compiled a …☆40Updated 2 years ago
- ☆18Updated 2 years ago
- Example of passing file descriptors into a container to perform a privilege escalation on the host☆23Updated 4 years ago
- collections of container escape techniques 🐿☆69Updated 4 years ago
- ☆96Updated 4 months ago
- ☆32Updated 7 years ago
- Simple tool to decrypt Jenkins encrypted strings☆76Updated last year