badPods
Pod exploit demonstrator
A collection of Kubernetes pod manifests demonstrating the impact of elevated privileges on security and functionality.
A collection of manifests that will create pods with elevated privileges.
603 stars
21 watching
103 forks
Language: Shell
last commit: over 2 years ago assessmentexploitationhostipchostnetworkhostpathhostpidkubernetespenetration-testingpodspodspecprivilegedsecurity
Related projects:
Repository | Description | Stars |
---|---|---|
| An exploit allowing unauthorized access to sensitive data on a host machine through Kubernetes logs | 92 |
| Provides a tool to inspect and view details of pods on Kubernetes nodes | 58 |
| Demonstrates an escape vulnerability in Kubernetes allowing privileged access to a pod through symlinks | 35 |
| Smuggling HTTP traffic past proxy rules to bypass access controls | 661 |
| Tools for analyzing and exploiting vulnerabilities in Java deserialization vulnerabilities | 587 |
| A tool designed to analyze and exploit vulnerabilities in containers for pentesters and engineers | 654 |
| A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| An application used to exploit XXE vulnerabilities by generating XML payloads and serving them to test web applications. | 547 |
| An interactive tool for executing commands on pods in a Kubernetes cluster. | 135 |
| Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 |
| Demonstrates security vulnerabilities in the Linux kernel's eBPF system | 556 |
| A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |
| A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development | 25 |
| A toolkit for exploiting weaknesses in WPA2-Enterprise networks to gain unauthorized access to credentials | 2,213 |
| Creates stealthy droppers for loading malicious code into memory | 19 |