- 🏞️
- in/r0binak
Highlights
Starred repositories
Production-Grade Container Scheduling and Management
⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
📦 Make security testing of K8s, Docker, and Containerd easier.
notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
Automating situational awareness for cloud penetration tests.
Modern CLI for exploring vulnerability data with powerful search, filtering, and analysis capabilities.
A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.
Powerful+Fast+Low Privilege Kubernetes discovery tools
Catalogue all images of a Kubernetes cluster to multiple targets with Syft
A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clusters.
Post-exploit a compromised etcd, gain persistence and remote shell to nodes.
IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - …
Multicontext CLI for kubectl. All contexts at once or by keyword.