badPods
Pod exploit demonstrator
A collection of Kubernetes pod manifests demonstrating the impact of elevated privileges on security and functionality.
A collection of manifests that will create pods with elevated privileges.
603 stars
21 watching
103 forks
Language: Shell
last commit: over 3 years ago assessmentexploitationhostipchostnetworkhostpathhostpidkubernetespenetration-testingpodspodspecprivilegedsecurity
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | An exploit allowing unauthorized access to sensitive data on a host machine through Kubernetes logs | 92 |
| | Provides a tool to inspect and view details of pods on Kubernetes nodes | 58 |
| | Demonstrates an escape vulnerability in Kubernetes allowing privileged access to a pod through symlinks | 35 |
| | Smuggling HTTP traffic past proxy rules to bypass access controls | 661 |
| | Tools for analyzing and exploiting vulnerabilities in Java deserialization vulnerabilities | 587 |
| | A tool designed to analyze and exploit vulnerabilities in containers for pentesters and engineers | 654 |
| | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| | An application used to exploit XXE vulnerabilities by generating XML payloads and serving them to test web applications. | 547 |
| | An interactive tool for executing commands on pods in a Kubernetes cluster. | 135 |
| | Exploits a heap buffer overflow vulnerability in the XNU operating system kernel to cause a denial-of-service attack on iOS and macOS devices. | 35 |
| | Demonstrates security vulnerabilities in the Linux kernel's eBPF system | 556 |
| | A collection of tools and methodologies for identifying vulnerabilities in web applications | 3,698 |
| | A DeFi protocol with intentional vulnerabilities for testing and learning secure smart contract development | 25 |
| | A toolkit for exploiting weaknesses in WPA2-Enterprise networks to gain unauthorized access to credentials | 2,213 |
| | Creates stealthy droppers for loading malicious code into memory | 19 |