Skip to content
View r0binak's full-sized avatar
🗳️
kubectl auth can-i --list
🗳️
kubectl auth can-i --list

Block or report r0binak

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse

Starred repositories

Showing results

Collection of Cyber Threat Intelligence sources from the deep and dark web

6,244 1,047 Updated Nov 5, 2025

Workflow Engine for Kubernetes

Go 16,159 3,405 Updated Oct 30, 2025

Create honeypots for cloud environments

Python 104 9 Updated Oct 6, 2025

Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.

C 341 53 Updated Aug 29, 2025
C 30 5 Updated Aug 26, 2025

This project is designed to simulate GPU information, making it easier to test scenarios where a GPU is not available.

C++ 56 4 Updated Mar 5, 2025

CVE-2025-53547 one of poc code

9 Updated Jul 9, 2025

Script to exploit Grafana CVE-2025-4123: XSS and Full-Read SSRF

Python 51 9 Updated Jul 28, 2025

A tool specifically designed for Kubernetes environments aims to efficiently and automatically discover hidden vulnerable APIs within clusters.

Go 102 6 Updated May 20, 2025

io_uring based rootkit

Go 241 34 Updated Apr 24, 2025

IngressNightmare POC. world first non-blind remote execution exploitation with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - …

Go 86 15 Updated May 6, 2025

CVE-2025-1974

Python 90 28 Updated Apr 2, 2025

Free IDE for Kubernetes

TypeScript 3,732 125 Updated Nov 5, 2025

It's my solution for bugbounty automation

Python 19 1 Updated May 15, 2025

Document of Spider in the Pod - How to Penetrate Kubernetes with Low or No Privileges

9 Updated Feb 1, 2025

A penetration toolkit for container environment

C 106 19 Updated Nov 5, 2025
Python 84 3 Updated Oct 28, 2025

Validate the isolation posture of your container environment.

Rust 303 14 Updated Aug 12, 2025

A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.

Go 784 63 Updated Nov 3, 2025

Kubernetes Spec Explorer

TypeScript 555 30 Updated Nov 4, 2025

Streamline vulnerability patching with CVSS, EPSS, and CISA's Known Exploited Vulnerabilities. Prioritize actions based on real-time threat information, gain a competitive advantage, and stay infor…

Python 677 96 Updated Oct 7, 2025

GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems

HTML 12,274 1,449 Updated Sep 17, 2025

Kubernetes has its “ADCS” -- How To Backdoor a Kubernetes in silence and more persistent?

39 3 Updated Aug 25, 2024

HASH (HTTP Agnostic Software Honeypot)

JavaScript 140 8 Updated May 1, 2024

Powerful+Fast+Low Privilege Kubernetes discovery tools

Go 254 16 Updated Jul 29, 2025
Go 3 Updated Aug 13, 2024

#differential #supply #chain #attack #detection

YARA 564 54 Updated Nov 5, 2025

Damn Vulnerable Kubernetes App (DVKA) is a series of apps deployed on Kubernetes that are damn vulnerable.

CSS 190 38 Updated Sep 16, 2025

A collection of bypasses and exploits for eBPF-based cloud security.

C++ 25 3 Updated Jan 12, 2024
Next