- 🏞️
- in/r0binak
Highlights
Starred repositories
Production-Grade Container Scheduling and Management
GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
Collection of Cyber Threat Intelligence sources from the deep and dark web
List of telegram groups, channels & bots // Список интересных групп, каналов и ботов телеграма // Список чатов для программистов
📦 Make security testing of K8s, Docker, and Containerd easier.
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Kubetools - Curated List of Kubernetes Tools
Automating situational awareness for cloud penetration tests.
Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.
The open source, cloud native tool for API Mocking and Testing. Microcks is a Cloud Native Computing Foundation sandbox project 🚀
Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).
AutoPWN Suite is a project for scanning vulnerabilities and exploiting systems automatically.
A technique to run binaries filelessly and stealthily on Linux by "overwriting" the shell's process with another.
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay infor…
A collection of manifests that will create pods with elevated privileges.
#differential #supply #chain #attack #detection
Proof of concept code for Datadog Security Labs referenced exploits.
A curated list of resources about detecting threats and defending Kubernetes systems.
Репозиторий содержит список вопросов по наступальной безопасности.
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.