kube-pod-escape
Host log exploit
An exploit allowing unauthorized access to sensitive data on a host machine through Kubernetes logs
Kubernetes POC for utilizing write mount to /var/log for getting a root on the host
92 stars
5 watching
14 forks
Language: Python
last commit: over 4 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Demonstrates an escape vulnerability in Kubernetes allowing privileged access to a pod through symlinks | 35 |
| A collection of Kubernetes pod manifests demonstrating the impact of elevated privileges on security and functionality. | 603 |
| Provides a tool to inspect and view details of pods on Kubernetes nodes | 58 |
| A cross-platform post-exploitation toolset for containerized environments | 1,130 |
| Tool to create checkpoint snapshots of running Kubernetes pods for forensic analysis after termination. | 223 |
| An exploit demonstrating a Kubernetes validation admission webhook bypass vulnerability | 18 |
| A kubernetes authentication plugin that provides oidc-based login functionality | 1 |
| Tool to execute commands in all containers of a given Kubernetes resource | 4 |
| An exploit tool for a Windows SMBv3 vulnerability | 1,303 |
| A tool to access Kubernetes nodes or remote services through an intermediary SSH gateway | 177 |
| A tool that allows debugging and interaction with pods in Kubernetes | 11 |
| A tool that displays resource usage of pods on Kubernetes nodes in a format similar to the `free` command. | 22 |
| Makes it easier to remotely access nodes within a Kubernetes cluster | 4 |
| A tool to easily execute commands inside a Kubernetes pod from the command line | 15 |
| An extension to kubectl that allows attaching a Tmux session to a running pod | 1 |